/*
|
*
|
* honggfuzz - routines dealing with subprocesses
|
* -----------------------------------------
|
*
|
* Author: Robert Swiecki <swiecki@google.com>
|
* Felix Gröbert <groebert@google.com>
|
*
|
* Copyright 2010-2018 by Google Inc. All Rights Reserved.
|
*
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
* not use this file except in compliance with the License. You may obtain
|
* a copy of the License at
|
*
|
* http://www.apache.org/licenses/LICENSE-2.0
|
*
|
* Unless required by applicable law or agreed to in writing, software
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
* implied. See the License for the specific language governing
|
* permissions and limitations under the License.
|
*
|
*/
|
|
#include "subproc.h"
|
|
#include <errno.h>
|
#include <fcntl.h>
|
#include <inttypes.h>
|
#include <signal.h>
|
#include <stdio.h>
|
#include <stdlib.h>
|
#include <string.h>
|
#include <sys/resource.h>
|
#include <sys/socket.h>
|
#include <sys/time.h>
|
#include <sys/types.h>
|
#include <sys/wait.h>
|
#include <unistd.h>
|
|
#include "arch.h"
|
#include "fuzz.h"
|
#include "libhfcommon/common.h"
|
#include "libhfcommon/files.h"
|
#include "libhfcommon/log.h"
|
#include "libhfcommon/util.h"
|
|
extern char** environ;
|
|
const char* subproc_StatusToStr(int status, char* str, size_t len) {
|
if (WIFEXITED(status)) {
|
snprintf(str, len, "EXITED, exit code: %d", WEXITSTATUS(status));
|
return str;
|
}
|
|
if (WIFSIGNALED(status)) {
|
snprintf(
|
str, len, "SIGNALED, signal: %d (%s)", WTERMSIG(status), strsignal(WTERMSIG(status)));
|
return str;
|
}
|
if (WIFCONTINUED(status)) {
|
snprintf(str, len, "CONTINUED");
|
return str;
|
}
|
|
if (!WIFSTOPPED(status)) {
|
snprintf(str, len, "UNKNOWN STATUS: %d", status);
|
return str;
|
}
|
|
/* Must be in a stopped state */
|
if (WSTOPSIG(status) == (SIGTRAP | 0x80)) {
|
snprintf(str, len, "STOPPED (linux syscall): %d (%s)", WSTOPSIG(status),
|
strsignal(WSTOPSIG(status)));
|
return str;
|
}
|
#if defined(PTRACE_EVENT_STOP)
|
#define __LINUX_WPTRACEEVENT(x) ((x & 0xff0000) >> 16)
|
if (WSTOPSIG(status) == SIGTRAP && __LINUX_WPTRACEEVENT(status) != 0) {
|
switch (__LINUX_WPTRACEEVENT(status)) {
|
case PTRACE_EVENT_FORK:
|
snprintf(str, len, "EVENT (Linux) - fork - with signal: %d (%s)", WSTOPSIG(status),
|
strsignal(WSTOPSIG(status)));
|
return str;
|
case PTRACE_EVENT_VFORK:
|
snprintf(str, len, "EVENT (Linux) - vfork - with signal: %d (%s)", WSTOPSIG(status),
|
strsignal(WSTOPSIG(status)));
|
return str;
|
case PTRACE_EVENT_CLONE:
|
snprintf(str, len, "EVENT (Linux) - clone - with signal: %d (%s)", WSTOPSIG(status),
|
strsignal(WSTOPSIG(status)));
|
return str;
|
case PTRACE_EVENT_EXEC:
|
snprintf(str, len, "EVENT (Linux) - exec - with signal: %d (%s)", WSTOPSIG(status),
|
strsignal(WSTOPSIG(status)));
|
return str;
|
case PTRACE_EVENT_VFORK_DONE:
|
snprintf(str, len, "EVENT (Linux) - vfork_done - with signal: %d (%s)",
|
WSTOPSIG(status), strsignal(WSTOPSIG(status)));
|
return str;
|
case PTRACE_EVENT_EXIT:
|
snprintf(str, len, "EVENT (Linux) - exit - with signal: %d (%s)", WSTOPSIG(status),
|
strsignal(WSTOPSIG(status)));
|
return str;
|
case PTRACE_EVENT_SECCOMP:
|
snprintf(str, len, "EVENT (Linux) - seccomp - with signal: %d (%s)",
|
WSTOPSIG(status), strsignal(WSTOPSIG(status)));
|
return str;
|
case PTRACE_EVENT_STOP:
|
snprintf(str, len, "EVENT (Linux) - stop - with signal: %d (%s)", WSTOPSIG(status),
|
strsignal(WSTOPSIG(status)));
|
return str;
|
default:
|
snprintf(str, len, "EVENT (Linux) UNKNOWN (%d): with signal: %d (%s)",
|
__LINUX_WPTRACEEVENT(status), WSTOPSIG(status), strsignal(WSTOPSIG(status)));
|
return str;
|
}
|
}
|
#endif /* defined(PTRACE_EVENT_STOP) */
|
|
snprintf(
|
str, len, "STOPPED with signal: %d (%s)", WSTOPSIG(status), strsignal(WSTOPSIG(status)));
|
return str;
|
}
|
|
static bool subproc_persistentSendFileIndicator(run_t* run) {
|
uint64_t len = (uint64_t)run->dynamicFileSz;
|
if (!files_sendToSocketNB(run->persistentSock, (uint8_t*)&len, sizeof(len))) {
|
PLOG_W("files_sendToSocketNB(len=%zu)", sizeof(len));
|
return false;
|
}
|
return true;
|
}
|
|
static bool subproc_persistentGetReady(run_t* run) {
|
uint8_t rcv;
|
if (recv(run->persistentSock, &rcv, sizeof(rcv), MSG_DONTWAIT) != sizeof(rcv)) {
|
return false;
|
}
|
if (rcv != HFReadyTag) {
|
LOG_E("Received invalid message from the persistent process: '%c' (0x%" PRIx8
|
") , expected '%c' (0x%" PRIx8 ")",
|
rcv, rcv, HFReadyTag, HFReadyTag);
|
return false;
|
}
|
return true;
|
}
|
|
bool subproc_persistentModeStateMachine(run_t* run) {
|
if (!run->global->exe.persistent) {
|
return false;
|
}
|
|
for (;;) {
|
switch (run->runState) {
|
case _HF_RS_WAITING_FOR_INITIAL_READY: {
|
if (!subproc_persistentGetReady(run)) {
|
return false;
|
}
|
run->runState = _HF_RS_SEND_DATA;
|
}; break;
|
case _HF_RS_SEND_DATA: {
|
if (!subproc_persistentSendFileIndicator(run)) {
|
LOG_E("Could not send the file size indicator to the persistent process. "
|
"Killing the process pid=%d",
|
(int)run->pid);
|
kill(run->pid, SIGKILL);
|
return false;
|
}
|
run->runState = _HF_RS_WAITING_FOR_READY;
|
}; break;
|
case _HF_RS_WAITING_FOR_READY: {
|
if (!subproc_persistentGetReady(run)) {
|
return false;
|
}
|
run->runState = _HF_RS_SEND_DATA;
|
/* The current persistent round is done */
|
return true;
|
}; break;
|
default: {
|
LOG_F("Unknown runState: %d", run->runState);
|
}; break;
|
}
|
}
|
}
|
|
static bool subproc_PrepareExecv(run_t* run) {
|
/*
|
* The address space limit. If big enough - roughly the size of RAM used
|
*/
|
#ifdef RLIMIT_AS
|
if (run->global->exe.asLimit) {
|
const struct rlimit rl = {
|
.rlim_cur = run->global->exe.asLimit * 1024ULL * 1024ULL,
|
.rlim_max = run->global->exe.asLimit * 1024ULL * 1024ULL,
|
};
|
if (setrlimit(RLIMIT_AS, &rl) == -1) {
|
PLOG_W("Couldn't enforce the RLIMIT_AS resource limit, ignoring");
|
}
|
}
|
#endif /* ifdef RLIMIT_AS */
|
#ifdef RLIMIT_RSS
|
if (run->global->exe.rssLimit) {
|
const struct rlimit rl = {
|
.rlim_cur = run->global->exe.rssLimit * 1024ULL * 1024ULL,
|
.rlim_max = run->global->exe.rssLimit * 1024ULL * 1024ULL,
|
};
|
if (setrlimit(RLIMIT_RSS, &rl) == -1) {
|
PLOG_W("Couldn't enforce the RLIMIT_RSS resource limit, ignoring");
|
}
|
}
|
#endif /* ifdef RLIMIT_RSS */
|
#ifdef RLIMIT_DATA
|
if (run->global->exe.dataLimit) {
|
const struct rlimit rl = {
|
.rlim_cur = run->global->exe.dataLimit * 1024ULL * 1024ULL,
|
.rlim_max = run->global->exe.dataLimit * 1024ULL * 1024ULL,
|
};
|
if (setrlimit(RLIMIT_DATA, &rl) == -1) {
|
PLOG_W("Couldn't enforce the RLIMIT_DATA resource limit, ignoring");
|
}
|
}
|
#endif /* ifdef RLIMIT_DATA */
|
#ifdef RLIMIT_CORE
|
const struct rlimit rl = {
|
.rlim_cur = run->global->exe.coreLimit * 1024ULL * 1024ULL,
|
.rlim_max = run->global->exe.coreLimit * 1024ULL * 1024ULL,
|
};
|
if (setrlimit(RLIMIT_CORE, &rl) == -1) {
|
PLOG_W("Couldn't enforce the RLIMIT_CORE resource limit, ignoring");
|
}
|
#endif /* ifdef RLIMIT_CORE */
|
|
if (run->global->exe.clearEnv) {
|
environ = NULL;
|
}
|
for (size_t i = 0; i < ARRAYSIZE(run->global->exe.envs) && run->global->exe.envs[i]; i++) {
|
putenv(run->global->exe.envs[i]);
|
}
|
char fuzzNo[128];
|
snprintf(fuzzNo, sizeof(fuzzNo), "%" PRId32, run->fuzzNo);
|
setenv(_HF_THREAD_NO_ENV, fuzzNo, 1);
|
if (run->global->exe.netDriver) {
|
setenv(_HF_THREAD_NETDRIVER_ENV, "1", 1);
|
}
|
|
/* Make sure it's a new process group / session, so waitpid can wait for -(run->pid) */
|
setsid();
|
|
util_closeStdio(/* close_stdin= */ run->global->exe.nullifyStdio,
|
/* close_stdout= */ run->global->exe.nullifyStdio,
|
/* close_stderr= */ run->global->exe.nullifyStdio);
|
|
/* The bitmap structure */
|
if (run->global->feedback.bbFd != -1 && dup2(run->global->feedback.bbFd, _HF_BITMAP_FD) == -1) {
|
PLOG_E("dup2(%d, _HF_BITMAP_FD=%d)", run->global->feedback.bbFd, _HF_BITMAP_FD);
|
return false;
|
}
|
|
/* The input file to _HF_INPUT_FD */
|
if (run->global->exe.persistent && dup2(run->dynamicFileFd, _HF_INPUT_FD) == -1) {
|
PLOG_E("dup2('%d', _HF_INPUT_FD='%d')", run->dynamicFileFd, _HF_INPUT_FD);
|
return false;
|
}
|
|
/* The log FD */
|
if ((run->global->exe.netDriver || run->global->exe.persistent)) {
|
if (dup2(logFd(), _HF_LOG_FD) == -1) {
|
PLOG_E("dup2(%d, _HF_LOG_FD=%d)", logFd(), _HF_LOG_FD);
|
return false;
|
}
|
char llstr[32];
|
snprintf(llstr, sizeof(llstr), "%d", logGetLevel());
|
setenv(_HF_LOG_LEVEL_ENV, llstr, 1);
|
}
|
|
sigset_t sset;
|
sigemptyset(&sset);
|
if (sigprocmask(SIG_SETMASK, &sset, NULL) == -1) {
|
PLOG_W("sigprocmask(empty_set)");
|
}
|
|
if (!run->global->exe.persistent) {
|
if ((run->dynamicFileCopyFd = files_writeBufToTmpFile(
|
run->global->io.workDir, run->dynamicFile, run->dynamicFileSz, 0)) == -1) {
|
LOG_E("Couldn't save data to a temporary file");
|
return false;
|
}
|
if (run->global->exe.fuzzStdin && dup2(run->dynamicFileCopyFd, STDIN_FILENO) == -1) {
|
PLOG_E("dup2(_HF_INPUT_FD=%d, STDIN_FILENO=%d)", run->dynamicFileCopyFd, STDIN_FILENO);
|
return false;
|
}
|
}
|
|
return true;
|
}
|
|
static bool subproc_New(run_t* run) {
|
if (run->pid) {
|
return true;
|
}
|
|
int sv[2];
|
if (run->global->exe.persistent) {
|
if (run->persistentSock != -1) {
|
close(run->persistentSock);
|
}
|
|
int sock_type = SOCK_STREAM;
|
#if defined(SOCK_CLOEXEC)
|
sock_type |= SOCK_CLOEXEC;
|
#endif
|
if (socketpair(AF_UNIX, sock_type, 0, sv) == -1) {
|
PLOG_W("socketpair(AF_UNIX, SOCK_STREAM, 0, sv)");
|
return false;
|
}
|
run->persistentSock = sv[0];
|
}
|
|
LOG_D("Forking new process for thread: %" PRId32, run->fuzzNo);
|
|
run->pid = arch_fork(run);
|
if (run->pid == -1) {
|
PLOG_E("Couldn't fork");
|
run->pid = 0;
|
return false;
|
}
|
/* The child process */
|
if (!run->pid) {
|
logMutexReset();
|
/*
|
* Reset sighandlers, and set alarm(1). It's a guarantee against dead-locks
|
* in the child, where we ensure here that the child process will either
|
* execve or get signaled by SIGALRM within 1 second.
|
*
|
* Those deadlocks typically stem from the fact, that malloc() can behave weirdly
|
* when fork()-ing a single thread of a process: e.g. with glibc < 2.24
|
* (or, Ubuntu's 2.23-0ubuntu6). For more see
|
* http://changelogs.ubuntu.com/changelogs/pool/main/g/glibc/glibc_2.23-0ubuntu7/changelog
|
*/
|
alarm(1);
|
signal(SIGALRM, SIG_DFL);
|
|
if (run->global->exe.persistent) {
|
if (dup2(sv[1], _HF_PERSISTENT_FD) == -1) {
|
PLOG_F("dup2('%d', '%d')", sv[1], _HF_PERSISTENT_FD);
|
}
|
close(sv[0]);
|
close(sv[1]);
|
}
|
|
if (!subproc_PrepareExecv(run)) {
|
LOG_E("subproc_PrepareExecv() failed");
|
exit(EXIT_FAILURE);
|
}
|
if (!arch_launchChild(run)) {
|
LOG_E("Error launching child process");
|
kill(run->global->threads.mainPid, SIGTERM);
|
_exit(1);
|
}
|
abort();
|
}
|
|
/* Parent */
|
LOG_D("Launched new process, pid=%d, thread: %" PRId32 " (concurrency: %zd)", (int)run->pid,
|
run->fuzzNo, run->global->threads.threadsMax);
|
|
arch_prepareParentAfterFork(run);
|
|
if (run->global->exe.persistent) {
|
close(sv[1]);
|
run->runState = _HF_RS_WAITING_FOR_INITIAL_READY;
|
LOG_I("Persistent mode: Launched new persistent pid=%d", (int)run->pid);
|
}
|
|
return true;
|
}
|
|
bool subproc_Run(run_t* run) {
|
run->timeStartedMillis = util_timeNowMillis();
|
|
if (!subproc_New(run)) {
|
LOG_E("subproc_New()");
|
return false;
|
}
|
|
arch_prepareParent(run);
|
arch_reapChild(run);
|
|
return true;
|
}
|
|
uint8_t subproc_System(run_t* run, const char* const argv[]) {
|
pid_t pid = arch_fork(run);
|
if (pid == -1) {
|
PLOG_E("Couldn't fork");
|
return 255;
|
}
|
if (!pid) {
|
logMutexReset();
|
|
setsid();
|
util_closeStdio(
|
/* close_stdin= */ true, /* close_stdout= */ false, /* close_stderr= */ false);
|
|
sigset_t sset;
|
sigemptyset(&sset);
|
if (sigprocmask(SIG_SETMASK, &sset, NULL) == -1) {
|
PLOG_W("sigprocmask(empty_set)");
|
}
|
|
execv(argv[0], (char* const*)&argv[0]);
|
PLOG_F("Couldn't execute '%s'", argv[0]);
|
return 255;
|
}
|
|
int flags = 0;
|
#if defined(__WNOTHREAD)
|
flags |= __WNOTHREAD;
|
#endif /* defined(__WNOTHREAD) */
|
#if defined(__WALL)
|
flags |= __WALL;
|
#endif /* defined(__WALL) */
|
|
for (;;) {
|
int status;
|
int ret = wait4(pid, &status, flags, NULL);
|
if (ret == -1 && errno == EINTR) {
|
continue;
|
}
|
if (ret == -1) {
|
PLOG_E("wait4() for process pid=%d", (int)pid);
|
return 255;
|
}
|
if (ret != pid) {
|
LOG_E("wait4() returned %d, but waited for %d", ret, (int)pid);
|
return 255;
|
}
|
if (WIFSIGNALED(status)) {
|
LOG_E("Command '%s' terminated with signal: %d", argv[0], WTERMSIG(status));
|
return (100 + WTERMSIG(status));
|
}
|
if (WIFEXITED(status)) {
|
if (WEXITSTATUS(status) == 0) {
|
return 0U;
|
}
|
LOG_E("Command '%s' returned with exit code %d", argv[0], WEXITSTATUS(status));
|
return 1U;
|
}
|
|
LOG_D("wait4() returned with status: %d", status);
|
}
|
}
|
|
void subproc_checkTimeLimit(run_t* run) {
|
if (!run->global->timing.tmOut) {
|
return;
|
}
|
|
int64_t curMillis = util_timeNowMillis();
|
int64_t diffMillis = curMillis - run->timeStartedMillis;
|
|
if (run->tmOutSignaled && (diffMillis > ((run->global->timing.tmOut + 1) * 1000))) {
|
/* Has this instance been already signaled due to timeout? Just, SIGKILL it */
|
LOG_W("pid=%d has already been signaled due to timeout. Killing it with SIGKILL", run->pid);
|
kill(run->pid, SIGKILL);
|
return;
|
}
|
|
if ((diffMillis > (run->global->timing.tmOut * 1000)) && !run->tmOutSignaled) {
|
run->tmOutSignaled = true;
|
LOG_W("pid=%d took too much time (limit %ld s). Killing it with %s", (int)run->pid,
|
(long)run->global->timing.tmOut,
|
run->global->timing.tmoutVTALRM ? "SIGVTALRM" : "SIGKILL");
|
if (run->global->timing.tmoutVTALRM) {
|
kill(run->pid, SIGVTALRM);
|
} else {
|
kill(run->pid, SIGKILL);
|
}
|
ATOMIC_POST_INC(run->global->cnts.timeoutedCnt);
|
}
|
}
|
|
void subproc_checkTermination(run_t* run) {
|
if (fuzz_isTerminating()) {
|
LOG_D("Killing pid=%d", (int)run->pid);
|
kill(run->pid, SIGKILL);
|
}
|
}
|
|
bool subproc_runThread(honggfuzz_t* hfuzz, pthread_t* thread, void* (*thread_func)(void*)) {
|
pthread_attr_t attr;
|
|
pthread_attr_init(&attr);
|
pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
|
pthread_attr_setstacksize(&attr, _HF_PTHREAD_STACKSIZE);
|
pthread_attr_setguardsize(&attr, (size_t)sysconf(_SC_PAGESIZE));
|
|
if (pthread_create(thread, &attr, thread_func, (void*)hfuzz) < 0) {
|
PLOG_W("Couldn't create a new thread");
|
return false;
|
}
|
|
pthread_attr_destroy(&attr);
|
|
return true;
|
}
|