blob: 9950445bc18f2c450ed3b7b53c5372a9b09e1ea6 [file] [log] [blame]
george.karpenkov29efa6d2017-08-21 23:25:50 +00001//===- FuzzerInternal.h - Internal header for the Fuzzer --------*- C++ -* ===//
2//
chandlerc40284492019-01-19 08:50:56 +00003// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
george.karpenkov29efa6d2017-08-21 23:25:50 +00006//
7//===----------------------------------------------------------------------===//
8// Define the main class fuzzer::Fuzzer and most functions.
9//===----------------------------------------------------------------------===//
10
11#ifndef LLVM_FUZZER_INTERNAL_H
12#define LLVM_FUZZER_INTERNAL_H
13
kcc86e43882018-06-06 01:23:29 +000014#include "FuzzerDataFlowTrace.h"
george.karpenkov29efa6d2017-08-21 23:25:50 +000015#include "FuzzerDefs.h"
16#include "FuzzerExtFunctions.h"
17#include "FuzzerInterface.h"
18#include "FuzzerOptions.h"
19#include "FuzzerSHA1.h"
20#include "FuzzerValueBitMap.h"
21#include <algorithm>
22#include <atomic>
23#include <chrono>
24#include <climits>
25#include <cstdlib>
26#include <string.h>
27
28namespace fuzzer {
29
30using namespace std::chrono;
31
32class Fuzzer {
33public:
34
35 Fuzzer(UserCallback CB, InputCorpus &Corpus, MutationDispatcher &MD,
36 FuzzingOptions Options);
37 ~Fuzzer();
kcc2e93b3f2017-08-29 02:05:01 +000038 void Loop(const Vector<std::string> &CorpusDirs);
39 void ReadAndExecuteSeedCorpora(const Vector<std::string> &CorpusDirs);
george.karpenkov29efa6d2017-08-21 23:25:50 +000040 void MinimizeCrashLoop(const Unit &U);
george.karpenkov29efa6d2017-08-21 23:25:50 +000041 void RereadOutputCorpus(size_t MaxSize);
42
43 size_t secondsSinceProcessStartUp() {
44 return duration_cast<seconds>(system_clock::now() - ProcessStartTime)
45 .count();
46 }
47
48 bool TimedOut() {
49 return Options.MaxTotalTimeSec > 0 &&
50 secondsSinceProcessStartUp() >
51 static_cast<size_t>(Options.MaxTotalTimeSec);
52 }
53
54 size_t execPerSec() {
55 size_t Seconds = secondsSinceProcessStartUp();
56 return Seconds ? TotalNumberOfRuns / Seconds : 0;
57 }
58
59 size_t getTotalNumberOfRuns() { return TotalNumberOfRuns; }
60
61 static void StaticAlarmCallback();
62 static void StaticCrashSignalCallback();
63 static void StaticExitCallback();
64 static void StaticInterruptCallback();
65 static void StaticFileSizeExceedCallback();
kcc1239a992017-11-09 20:30:19 +000066 static void StaticGracefulExitCallback();
george.karpenkov29efa6d2017-08-21 23:25:50 +000067
68 void ExecuteCallback(const uint8_t *Data, size_t Size);
69 bool RunOne(const uint8_t *Data, size_t Size, bool MayDeleteFile = false,
kccb6836be2017-12-01 19:18:38 +000070 InputInfo *II = nullptr, bool *FoundUniqFeatures = nullptr);
george.karpenkov29efa6d2017-08-21 23:25:50 +000071
72 // Merge Corpora[1:] into Corpora[0].
george.karpenkovfbfa45c2017-08-27 23:20:09 +000073 void Merge(const Vector<std::string> &Corpora);
74 void CrashResistantMerge(const Vector<std::string> &Args,
75 const Vector<std::string> &Corpora,
george.karpenkov29efa6d2017-08-21 23:25:50 +000076 const char *CoverageSummaryInputPathOrNull,
kccc51afd72017-11-09 01:05:29 +000077 const char *CoverageSummaryOutputPathOrNull,
78 const char *MergeControlFilePathOrNull);
george.karpenkov29efa6d2017-08-21 23:25:50 +000079 void CrashResistantMergeInternalStep(const std::string &ControlFilePath);
80 MutationDispatcher &GetMD() { return MD; }
81 void PrintFinalStats();
82 void SetMaxInputLen(size_t MaxInputLen);
83 void SetMaxMutationLen(size_t MaxMutationLen);
84 void RssLimitCallback();
85
86 bool InFuzzingThread() const { return IsMyThread; }
87 size_t GetCurrentUnitInFuzzingThead(const uint8_t **Data) const;
88 void TryDetectingAMemoryLeak(const uint8_t *Data, size_t Size,
89 bool DuringInitialCorpusExecution);
90
91 void HandleMalloc(size_t Size);
george.karpenkov29efa6d2017-08-21 23:25:50 +000092
93private:
94 void AlarmCallback();
95 void CrashCallback();
96 void ExitCallback();
kcc1239a992017-11-09 20:30:19 +000097 void MaybeExitGracefully();
george.karpenkov29efa6d2017-08-21 23:25:50 +000098 void CrashOnOverwrittenData();
99 void InterruptCallback();
100 void MutateAndTestOne();
alekseyshld995b552017-10-23 22:04:30 +0000101 void PurgeAllocator();
george.karpenkov29efa6d2017-08-21 23:25:50 +0000102 void ReportNewCoverage(InputInfo *II, const Unit &U);
103 void PrintPulseAndReportSlowInput(const uint8_t *Data, size_t Size);
104 void WriteToOutputCorpus(const Unit &U);
105 void WriteUnitToFileWithPrefix(const Unit &U, const char *Prefix);
106 void PrintStats(const char *Where, const char *End = "\n", size_t Units = 0);
107 void PrintStatusForNewUnit(const Unit &U, const char *Text);
george.karpenkov29efa6d2017-08-21 23:25:50 +0000108 void CheckExitOnSrcPosOrItem();
109
110 static void StaticDeathCallback();
111 void DumpCurrentUnit(const char *Prefix);
112 void DeathCallback();
113
114 void AllocateCurrentUnitData();
115 uint8_t *CurrentUnitData = nullptr;
116 std::atomic<size_t> CurrentUnitSize;
117 uint8_t BaseSha1[kSHA1NumBytes]; // Checksum of the base unit.
george.karpenkov29efa6d2017-08-21 23:25:50 +0000118
kcc1239a992017-11-09 20:30:19 +0000119 bool GracefulExitRequested = false;
120
george.karpenkov29efa6d2017-08-21 23:25:50 +0000121 size_t TotalNumberOfRuns = 0;
122 size_t NumberOfNewUnitsAdded = 0;
123
124 size_t LastCorpusUpdateRun = 0;
george.karpenkov29efa6d2017-08-21 23:25:50 +0000125
126 bool HasMoreMallocsThanFrees = false;
127 size_t NumberOfLeakDetectionAttempts = 0;
128
alekseyshld995b552017-10-23 22:04:30 +0000129 system_clock::time_point LastAllocatorPurgeAttemptTime = system_clock::now();
130
george.karpenkov29efa6d2017-08-21 23:25:50 +0000131 UserCallback CB;
132 InputCorpus &Corpus;
133 MutationDispatcher &MD;
134 FuzzingOptions Options;
kcc86e43882018-06-06 01:23:29 +0000135 DataFlowTrace DFT;
george.karpenkov29efa6d2017-08-21 23:25:50 +0000136
137 system_clock::time_point ProcessStartTime = system_clock::now();
138 system_clock::time_point UnitStartTime, UnitStopTime;
139 long TimeOfLongestUnitInSeconds = 0;
140 long EpochOfLastReadOfOutputCorpus = 0;
141
142 size_t MaxInputLen = 0;
143 size_t MaxMutationLen = 0;
144 size_t TmpMaxMutationLen = 0;
145
george.karpenkovfbfa45c2017-08-27 23:20:09 +0000146 Vector<uint32_t> UniqFeatureSetTmp;
george.karpenkov29efa6d2017-08-21 23:25:50 +0000147
148 // Need to know our own thread.
149 static thread_local bool IsMyThread;
150};
151
morehouse1467b792018-07-09 23:51:08 +0000152struct ScopedEnableMsanInterceptorChecks {
153 ScopedEnableMsanInterceptorChecks() {
154 if (EF->__msan_scoped_enable_interceptor_checks)
155 EF->__msan_scoped_enable_interceptor_checks();
156 }
157 ~ScopedEnableMsanInterceptorChecks() {
158 if (EF->__msan_scoped_disable_interceptor_checks)
159 EF->__msan_scoped_disable_interceptor_checks();
160 }
161};
162
163struct ScopedDisableMsanInterceptorChecks {
164 ScopedDisableMsanInterceptorChecks() {
165 if (EF->__msan_scoped_disable_interceptor_checks)
166 EF->__msan_scoped_disable_interceptor_checks();
167 }
168 ~ScopedDisableMsanInterceptorChecks() {
169 if (EF->__msan_scoped_enable_interceptor_checks)
170 EF->__msan_scoped_enable_interceptor_checks();
171 }
172};
173
george.karpenkov29efa6d2017-08-21 23:25:50 +0000174} // namespace fuzzer
175
176#endif // LLVM_FUZZER_INTERNAL_H