blob: b571d15853624138663c54d0d26d36fd96c2b1cb [file] [log] [blame]
/*
honggfuzz - cmdline parsing
-----------------------------------------
Copyright 2014 Google Inc. All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
#include "cmdline.h"
#include <ctype.h>
#include <errno.h>
#include <getopt.h>
#include <inttypes.h>
#include <limits.h>
#if defined(_HF_ARCH_LINUX)
#include <sched.h>
#endif /* defined(_HF_ARCH_LINUX) */
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/mman.h>
#include <sys/queue.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
#include "libhfcommon/common.h"
#include "libhfcommon/files.h"
#include "libhfcommon/log.h"
#include "libhfcommon/util.h"
struct custom_option {
struct option opt;
const char* descr;
};
static bool checkFor_FILE_PLACEHOLDER(const char* const* args) {
for (int x = 0; args[x]; x++) {
if (strstr(args[x], _HF_FILE_PLACEHOLDER)) return true;
}
return false;
}
static bool cmdlineCheckBinaryType(honggfuzz_t* hfuzz) {
if (!files_exists(hfuzz->exe.cmdline[0])) {
LOG_W("Your fuzzed binary doesn't exist: '%s'", hfuzz->exe.cmdline[0]);
return false;
}
int fd;
off_t fileSz;
uint8_t* map = files_mapFile(hfuzz->exe.cmdline[0], &fileSz, &fd, /* isWriteable= */ false);
if (!map) {
/* It's not a critical error */
return true;
}
defer {
if (munmap(map, fileSz) == -1) {
PLOG_W("munmap(%p, %zu)", map, (size_t)fileSz);
}
close(fd);
};
if (memmem(map, fileSz, _HF_PERSISTENT_SIG, strlen(_HF_PERSISTENT_SIG))) {
LOG_I("Persistent signature found in '%s'. Enabling persistent fuzzing mode",
hfuzz->exe.cmdline[0]);
hfuzz->exe.persistent = true;
}
if (memmem(map, fileSz, _HF_NETDRIVER_SIG, strlen(_HF_NETDRIVER_SIG))) {
LOG_I("NetDriver signature found '%s'", hfuzz->exe.cmdline[0]);
hfuzz->exe.netDriver = true;
}
return true;
}
static const char* cmdlineYesNo(bool yes) {
return (yes ? "true" : "false");
}
static void cmdlineHelp(const char* pname, struct custom_option* opts) {
LOG_HELP_BOLD("Usage: %s [options] -- path_to_command [args]", pname);
LOG_HELP_BOLD("Options:");
for (int i = 0; opts[i].opt.name; i++) {
if (isprint(opts[i].opt.val) && opts[i].opt.val < 0x80) {
LOG_HELP_BOLD(" --%s%s%c %s", opts[i].opt.name, "|-", opts[i].opt.val,
opts[i].opt.has_arg == required_argument ? "VALUE" : "");
} else {
LOG_HELP_BOLD(" --%s %s", opts[i].opt.name,
opts[i].opt.has_arg == required_argument ? "VALUE" : "");
}
LOG_HELP("\t%s", opts[i].descr);
}
LOG_HELP_BOLD("\nExamples:");
LOG_HELP(
" Run the binary over a mutated file chosen from the directory. Disable fuzzing feedback "
"(static mode):");
LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -x -- /usr/bin/djpeg " _HF_FILE_PLACEHOLDER);
LOG_HELP(" As above, provide input over STDIN:");
LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -x -s -- /usr/bin/djpeg");
LOG_HELP(" Use compile-time instrumentation (-fsanitize-coverage=trace-pc-guard,...):");
LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -- /usr/bin/djpeg " _HF_FILE_PLACEHOLDER);
LOG_HELP(" Use SANCOV instrumentation: (-fsanitize-coverage=bb/edge/func)");
LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -C -- /usr/bin/djpeg " _HF_FILE_PLACEHOLDER);
LOG_HELP(" Use persistent mode w/o instrumentation:");
LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -P -x -- /usr/bin/djpeg_persistent_mode");
LOG_HELP(
" Use persistent mode and compile-time (-fsanitize-coverage=trace-pc-guard,...) "
"instrumentation:");
LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -P -- /usr/bin/djpeg_persistent_mode");
#if defined(_HF_ARCH_LINUX)
LOG_HELP(
" Run the binary with dynamically generate inputs, maximize total no. of instructions:");
LOG_HELP_BOLD(" " PROG_NAME " --linux_perf_instr -- /usr/bin/djpeg " _HF_FILE_PLACEHOLDER);
LOG_HELP(" As above, maximize total no. of branches:");
LOG_HELP_BOLD(" " PROG_NAME " --linux_perf_branch -- /usr/bin/djpeg " _HF_FILE_PLACEHOLDER);
LOG_HELP(" As above, maximize unique branches (edges) via Intel BTS:");
LOG_HELP_BOLD(" " PROG_NAME " --linux_perf_bts_edge -- /usr/bin/djpeg " _HF_FILE_PLACEHOLDER);
LOG_HELP(
" As above, maximize unique code blocks via Intel Processor Trace (requires libipt.so):");
LOG_HELP_BOLD(" " PROG_NAME " --linux_perf_ipt_block -- /usr/bin/djpeg " _HF_FILE_PLACEHOLDER);
#endif /* defined(_HF_ARCH_LINUX) */
}
static void cmdlineUsage(const char* pname, struct custom_option* opts) {
cmdlineHelp(pname, opts);
exit(0);
}
rlim_t cmdlineParseRLimit(int res, const char* optarg, unsigned long mul) {
struct rlimit cur;
if (getrlimit(res, &cur) == -1) {
PLOG_F("getrlimit(%d)", res);
}
if (strcasecmp(optarg, "max") == 0) {
return cur.rlim_max;
}
if (strcasecmp(optarg, "def") == 0) {
return cur.rlim_cur;
}
if (util_isANumber(optarg) == false) {
LOG_F("RLIMIT %d needs a numeric or 'max'/'def' value ('%s' provided)", res, optarg);
}
rlim_t val = strtoul(optarg, NULL, 0) * mul;
if ((unsigned long)val == ULONG_MAX && errno != 0) {
PLOG_F("strtoul('%s', 0)", optarg);
}
return val;
}
static bool cmdlineVerify(honggfuzz_t* hfuzz) {
if (!cmdlineCheckBinaryType(hfuzz)) {
LOG_E("Couldn't test binary for signatures");
return false;
}
if (!hfuzz->exe.fuzzStdin && !hfuzz->exe.persistent &&
!checkFor_FILE_PLACEHOLDER(hfuzz->exe.cmdline)) {
LOG_E("You must specify '" _HF_FILE_PLACEHOLDER
"' if the -s (stdin fuzzing) or --persistent options are not set");
return false;
}
if (hfuzz->exe.fuzzStdin && hfuzz->exe.persistent) {
LOG_E(
"Stdin fuzzing (-s) and persistent fuzzing (-P) cannot be specified at the same time");
return false;
}
if (hfuzz->threads.threadsMax >= _HF_THREAD_MAX) {
LOG_E("Too many fuzzing threads specified %zu (>= _HF_THREAD_MAX (%u))",
hfuzz->threads.threadsMax, _HF_THREAD_MAX);
return false;
}
if (strchr(hfuzz->io.fileExtn, '/')) {
LOG_E("The file extension contains the '/' character: '%s'", hfuzz->io.fileExtn);
return false;
}
if (hfuzz->io.workDir == NULL) {
hfuzz->io.workDir = ".";
}
if (mkdir(hfuzz->io.workDir, 0700) == -1 && errno != EEXIST) {
PLOG_E("Couldn't create the workspace directory '%s'", hfuzz->io.workDir);
return false;
}
if (hfuzz->io.crashDir == NULL) {
hfuzz->io.crashDir = hfuzz->io.workDir;
}
if (mkdir(hfuzz->io.crashDir, 0700) && errno != EEXIST) {
PLOG_E("Couldn't create the crash directory '%s'", hfuzz->io.crashDir);
return false;
}
if (hfuzz->linux.pid > 0 || hfuzz->linux.pidFile) {
LOG_I("PID=%d specified, lowering maximum number of concurrent threads to 1",
hfuzz->linux.pid);
hfuzz->threads.threadsMax = 1;
}
if (hfuzz->mutationsPerRun == 0U && hfuzz->useVerifier) {
LOG_I("Verifier enabled with mutationsPerRun == 0, activating the dry run mode");
}
/*
* 'enableSanitizers' can be auto enabled when 'useSanCov', although it's probably
* better to let user know about the features that each flag control.
*/
if (hfuzz->useSanCov == true && hfuzz->enableSanitizers == false) {
LOG_E("Sanitizer coverage cannot be used without enabling sanitizers '-S/--sanitizers'");
return false;
}
if (hfuzz->maxFileSz > _HF_INPUT_MAX_SIZE) {
LOG_E("Maximum file size '%zu' bigger than the maximum size '%zu'", hfuzz->maxFileSz,
(size_t)_HF_INPUT_MAX_SIZE);
return false;
}
return true;
}
bool cmdlineParse(int argc, char* argv[], honggfuzz_t* hfuzz) {
honggfuzz_t tmp = {
.io =
{
.inputDir = NULL,
.inputDirPtr = NULL,
.fileCnt = 0,
.fileCntDone = false,
.fileExtn = "fuzz",
.workDir = NULL,
.crashDir = NULL,
.covDirAll = NULL,
.covDirNew = NULL,
.saveUnique = true,
},
.exe =
{
.argc = 0,
.cmdline = NULL,
.nullifyStdio = true,
.fuzzStdin = false,
.externalCommand = NULL,
.postExternalCommand = NULL,
.persistent = false,
.netDriver = false,
.asLimit = 0U,
.rssLimit = 0U,
.dataLimit = 0U,
.clearEnv = false,
.envs[0] = NULL,
},
.timing =
{
.timeStart = time(NULL),
.runEndTime = 0,
.tmOut = 10,
.tmoutVTALRM = false,
.lastCovUpdate = time(NULL),
},
.cmdline_txt[0] = '\0',
.useScreen = true,
.useVerifier = false,
.mutationsPerRun = 6U,
.blacklistFile = NULL,
.blacklistCnt = 0,
.blacklist = NULL,
.maxFileSz = 0UL,
.mutationsMax = 0,
.reportFile = NULL,
.skipFeedbackOnTimeout = false,
.enableSanitizers = false,
#if defined(__ANDROID__)
.monitorSIGABRT = false,
#else
.monitorSIGABRT = true,
#endif
.exitUponCrash = false,
.threads =
{
.threadsFinished = 0,
.threadsMax =
(sysconf(_SC_NPROCESSORS_ONLN) <= 1) ? 1 : sysconf(_SC_NPROCESSORS_ONLN) / 2,
.threadsActiveCnt = 0,
.mainThread = pthread_self(),
.mainPid = getpid(),
},
.dictionaryFile = NULL,
.dictionaryCnt = 0,
.state = _HF_STATE_UNSET,
.feedback = NULL,
.bbFd = -1,
.dynfileqCnt = 0U,
.dynfileq_mutex = PTHREAD_RWLOCK_INITIALIZER,
.feedback_mutex = PTHREAD_MUTEX_INITIALIZER,
.socketFuzzer = false,
.cnts =
{
.mutationsCnt = 0,
.crashesCnt = 0,
.uniqueCrashesCnt = 0,
.verifiedCrashesCnt = 0,
.blCrashesCnt = 0,
.timeoutedCnt = 0,
},
.dynFileMethod = _HF_DYNFILE_SOFT,
.sanCovCnts =
{
.hitBBCnt = 0ULL,
.totalBBCnt = 0ULL,
.dsoCnt = 0ULL,
.iDsoCnt = 0ULL,
.newBBCnt = 0ULL,
.crashesCnt = 0ULL,
},
.sanCov_mutex = PTHREAD_MUTEX_INITIALIZER,
.extSanOpts = NULL,
.useSanCov = false,
.covMetadata = NULL,
.report_mutex = PTHREAD_MUTEX_INITIALIZER,
/* Linux code */
.linux =
{
.exeFd = -1,
.hwCnts =
{
.cpuInstrCnt = 0ULL,
.cpuBranchCnt = 0ULL,
.bbCnt = 0ULL,
.newBBCnt = 0ULL,
.softCntPc = 0ULL,
.softCntCmp = 0ULL,
},
.dynamicCutOffAddr = ~(0ULL),
.disableRandomization = true,
.ignoreAddr = NULL,
.numMajorFrames = 7,
.pid = 0,
.pidFile = NULL,
.pidCmd = {},
.symsBlFile = NULL,
.symsBlCnt = 0,
.symsBl = NULL,
.symsWlFile = NULL,
.symsWlCnt = 0,
.symsWl = NULL,
.cloneFlags = 0,
.kernelOnly = false,
.useClone = true,
},
};
*hfuzz = tmp;
TAILQ_INIT(&hfuzz->dynfileq);
TAILQ_INIT(&hfuzz->dictq);
// clang-format off
struct custom_option custom_opts[] = {
{ { "help", no_argument, NULL, 'h' }, "Help plz.." },
{ { "input", required_argument, NULL, 'f' }, "Path to a directory containing initial file corpus" },
{ { "persistent", no_argument, NULL, 'P' }, "Enable persistent fuzzing (use hfuzz_cc/hfuzz-clang to compile code). This will be auto-detected!!!" },
{ { "instrument", no_argument, NULL, 'z' }, "*DEFAULT-MODE-BY-DEFAULT* Enable compile-time instrumentation (use hfuzz_cc/hfuzz-clang to compile code)" },
{ { "noinst", no_argument, NULL, 'x' }, "Static mode only, disable any instrumentation (hw/sw) feedback" },
{ { "sancov", no_argument, NULL, 'C' }, "Enable sanitizer coverage feedback" },
{ { "keep_output", no_argument, NULL, 'Q' }, "Don't close children's stdin, stdout, stderr; can be noisy" },
{ { "timeout", required_argument, NULL, 't' }, "Timeout in seconds (default: 10)" },
{ { "threads", required_argument, NULL, 'n' }, "Number of concurrent fuzzing threads (default: number of CPUs / 2)" },
{ { "stdin_input", no_argument, NULL, 's' }, "Provide fuzzing input on STDIN, instead of ___FILE___" },
{ { "mutations_per_run", required_argument, NULL, 'r' }, "Maximal number of mutations per one run (default: 6)" },
{ { "logfile", required_argument, NULL, 'l' }, "Log file" },
{ { "verbose", no_argument, NULL, 'v' }, "Disable ANSI console; use simple log output" },
{ { "verifier", no_argument, NULL, 'V' }, "Enable crashes verifier" },
{ { "debug", no_argument, NULL, 'd' }, "Show debug messages (level >= 4)" },
{ { "quiet", no_argument, NULL, 'q' }, "Show only warnings and more serious messages (level <= 1)" },
{ { "extension", required_argument, NULL, 'e' }, "Input file extension (e.g. 'swf'), (default: 'fuzz')" },
{ { "workspace", required_argument, NULL, 'W' }, "Workspace directory to save crashes & runtime files (default: '.')" },
{ { "crashdir", required_argument, NULL, 0x600 }, "Directory where crashes are saved to (default: workspace directory)" },
{ { "covdir_all", required_argument, NULL, 0x601 }, "Coverage is written to a separate directory (default: input directory)" },
{ { "covdir_new", required_argument, NULL, 0x602 }, "New coverage (beyond the dry-run fuzzing phase) is written to this separate directory" },
{ { "dict", required_argument, NULL, 'w' }, "Dictionary file. Format:http://llvm.org/docs/LibFuzzer.html#dictionaries" },
{ { "stackhash_bl", required_argument, NULL, 'B' }, "Stackhashes blacklist file (one entry per line)" },
{ { "mutate_cmd", required_argument, NULL, 'c' }, "External command producing fuzz files (instead of internal mutators)" },
{ { "pprocess_cmd", required_argument, NULL, 0x104 }, "External command postprocessing files produced by internal mutators" },
{ { "run_time", required_argument, NULL, 0x109 }, "Number of seconds this fuzzing session will last (default: 0 [no limit])" },
{ { "iterations", required_argument, NULL, 'N' }, "Number of fuzzing iterations (default: 0 [no limit])" },
{ { "rlimit_as", required_argument, NULL, 0x100 }, "Per process RLIMIT_AS in MiB (default: 0 [no limit])" },
{ { "rlimit_rss", required_argument, NULL, 0x101 }, "Per process RLIMIT_RSS in MiB (default: 0 [no limit]). It will also set *SAN's soft_rss_limit_mb if used" },
{ { "rlimit_data", required_argument, NULL, 0x102 }, "Per process RLIMIT_DATA in MiB (default: 0 [no limit])" },
{ { "report", required_argument, NULL, 'R' }, "Write report to this file (default: '<workdir>/" _HF_REPORT_FILE "')" },
{ { "max_file_size", required_argument, NULL, 'F' }, "Maximal size of files processed by the fuzzer in bytes (default: 1048576)" },
{ { "clear_env", no_argument, NULL, 0x108 }, "Clear all environment variables before executing the binary" },
{ { "env", required_argument, NULL, 'E' }, "Pass this environment variable, can be used multiple times" },
{ { "save_all", no_argument, NULL, 'u' }, "Save all test-cases (not only the unique ones) by appending the current time-stamp to the filenames" },
{ { "tmout_sigvtalrm", no_argument, NULL, 'T' }, "Use SIGVTALRM to kill timeouting processes (default: use SIGKILL)" },
{ { "sanitizers", no_argument, NULL, 'S' }, "Enable sanitizers settings (default: false)" },
{ { "san_opts", required_argument, NULL, 0x10A }, "Options appended to the regular *SAN_OPTIONS (default: empty)" },
{ { "monitor_sigabrt", required_argument, NULL, 0x105 }, "Monitor SIGABRT (default: false for Android, true for other platforms)" },
{ { "no_fb_timeout", required_argument, NULL, 0x106 }, "Skip feedback if the process has timeouted (default: false)" },
{ { "exit_upon_crash", no_argument, NULL, 0x107 }, "Exit upon seeing the first crash (default: false)" },
{ { "socket_fuzzer", no_argument, NULL, 0x10b }, "Instrument external fuzzer via socket" },
#if defined(_HF_ARCH_LINUX)
{ { "linux_symbols_bl", required_argument, NULL, 0x504 }, "Symbols blacklist filter file (one entry per line)" },
{ { "linux_symbols_wl", required_argument, NULL, 0x505 }, "Symbols whitelist filter file (one entry per line)" },
{ { "linux_pid", required_argument, NULL, 'p' }, "Attach to a pid (and its thread group)" },
{ { "linux_file_pid", required_argument, NULL, 0x502 }, "Attach to pid (and its thread group) read from file" },
{ { "linux_addr_low_limit", required_argument, NULL, 0x500 }, "Address limit (from si.si_addr) below which crashes are not reported, (default: 0)" },
{ { "linux_keep_aslr", no_argument, NULL, 0x501 }, "Don't disable ASLR randomization, might be useful with MSAN" },
{ { "linux_perf_ignore_above", required_argument, NULL, 0x503 }, "Ignore perf events which report IPs above this address" },
{ { "linux_perf_instr", no_argument, NULL, 0x510 }, "Use PERF_COUNT_HW_INSTRUCTIONS perf" },
{ { "linux_perf_branch", no_argument, NULL, 0x511 }, "Use PERF_COUNT_HW_BRANCH_INSTRUCTIONS perf" },
{ { "linux_perf_bts_edge", no_argument, NULL, 0x513 }, "Use Intel BTS to count unique edges" },
{ { "linux_perf_ipt_block", no_argument, NULL, 0x514 }, "Use Intel Processor Trace to count unique blocks (requires libipt.so)" },
{ { "linux_perf_kernel_only", no_argument, NULL, 0x515 }, "Gather kernel-only coverage with Intel PT and with Intel BTS" },
{ { "linux_ns_net", no_argument, NULL, 0x0530 }, "Use Linux NET namespace isolation" },
{ { "linux_ns_pid", no_argument, NULL, 0x0531 }, "Use Linux PID namespace isolation" },
{ { "linux_ns_ipc", no_argument, NULL, 0x0532 }, "Use Linux IPC namespace isolation" },
#endif // defined(_HF_ARCH_LINUX)
{ { 0, 0, 0, 0 }, NULL },
};
// clang-format on
struct option opts[ARRAYSIZE(custom_opts)];
for (unsigned i = 0; i < ARRAYSIZE(custom_opts); i++) {
opts[i] = custom_opts[i].opt;
}
enum llevel_t ll = INFO;
const char* logfile = NULL;
int opt_index = 0;
for (;;) {
int c = getopt_long(
argc, argv, "-?hQvVsuPxf:dqe:W:r:c:F:t:R:n:N:l:p:g:E:w:B:CzTS", opts, &opt_index);
if (c < 0) break;
switch (c) {
case 'h':
case '?':
cmdlineUsage(argv[0], custom_opts);
break;
case 'f':
hfuzz->io.inputDir = optarg;
if (hfuzz->io.covDirAll == NULL) {
hfuzz->io.covDirAll = optarg;
}
break;
case 'x':
hfuzz->dynFileMethod = _HF_DYNFILE_NONE;
break;
case 'Q':
hfuzz->exe.nullifyStdio = false;
break;
case 'v':
hfuzz->useScreen = false;
break;
case 'V':
hfuzz->useVerifier = true;
break;
case 's':
hfuzz->exe.fuzzStdin = true;
break;
case 'u':
hfuzz->io.saveUnique = false;
break;
case 'l':
logfile = optarg;
break;
case 'd':
ll = DEBUG;
break;
case 'q':
ll = WARNING;
break;
case 'e':
hfuzz->io.fileExtn = optarg;
break;
case 'W':
hfuzz->io.workDir = optarg;
break;
case 0x600:
hfuzz->io.crashDir = optarg;
break;
case 0x601:
hfuzz->io.covDirAll = optarg;
break;
case 0x602:
hfuzz->io.covDirNew = optarg;
break;
case 'r':
hfuzz->mutationsPerRun = strtoul(optarg, NULL, 10);
break;
case 'c':
hfuzz->exe.externalCommand = optarg;
break;
case 'C':
hfuzz->useSanCov = true;
break;
case 'S':
hfuzz->enableSanitizers = true;
break;
case 0x10A:
hfuzz->extSanOpts = optarg;
break;
case 0x10B:
hfuzz->socketFuzzer = true;
hfuzz->timing.tmOut = 0; // Disable process timeout checks
break;
case 'z':
hfuzz->dynFileMethod |= _HF_DYNFILE_SOFT;
break;
case 'F':
hfuzz->maxFileSz = strtoul(optarg, NULL, 0);
break;
case 't':
hfuzz->timing.tmOut = atol(optarg);
break;
case 'R':
hfuzz->reportFile = optarg;
break;
case 'n':
hfuzz->threads.threadsMax = atol(optarg);
break;
case 0x109: {
time_t p = atol(optarg);
if (p > 0) {
hfuzz->timing.runEndTime = time(NULL) + p;
}
} break;
case 'N':
hfuzz->mutationsMax = atol(optarg);
break;
case 0x100:
hfuzz->exe.asLimit = strtoull(optarg, NULL, 0);
break;
case 0x101:
hfuzz->exe.rssLimit = strtoull(optarg, NULL, 0);
break;
case 0x102:
hfuzz->exe.dataLimit = strtoull(optarg, NULL, 0);
break;
case 0x104:
hfuzz->exe.postExternalCommand = optarg;
break;
case 0x105:
if ((strcasecmp(optarg, "0") == 0) || (strcasecmp(optarg, "false") == 0)) {
hfuzz->monitorSIGABRT = false;
} else {
hfuzz->monitorSIGABRT = true;
}
break;
case 0x106:
hfuzz->skipFeedbackOnTimeout = true;
break;
case 0x107:
hfuzz->exitUponCrash = true;
break;
case 0x108:
hfuzz->exe.clearEnv = true;
break;
case 'P':
hfuzz->exe.persistent = true;
break;
case 'T':
hfuzz->timing.tmoutVTALRM = true;
break;
case 'p':
if (util_isANumber(optarg) == false) {
LOG_E("-p '%s' is not a number", optarg);
return false;
}
hfuzz->linux.pid = atoi(optarg);
if (hfuzz->linux.pid < 1) {
LOG_E("-p '%d' is invalid", hfuzz->linux.pid);
return false;
}
break;
case 0x502:
hfuzz->linux.pidFile = optarg;
break;
case 'E':
for (size_t i = 0; i < ARRAYSIZE(hfuzz->exe.envs); i++) {
if (hfuzz->exe.envs[i] == NULL) {
hfuzz->exe.envs[i] = optarg;
break;
}
}
break;
case 'w':
hfuzz->dictionaryFile = optarg;
break;
case 'B':
hfuzz->blacklistFile = optarg;
break;
#if defined(_HF_ARCH_LINUX)
case 0x500:
hfuzz->linux.ignoreAddr = (void*)strtoul(optarg, NULL, 0);
break;
case 0x501:
hfuzz->linux.disableRandomization = false;
break;
case 0x503:
hfuzz->linux.dynamicCutOffAddr = strtoull(optarg, NULL, 0);
break;
case 0x504:
hfuzz->linux.symsBlFile = optarg;
break;
case 0x505:
hfuzz->linux.symsWlFile = optarg;
break;
case 0x510:
hfuzz->dynFileMethod |= _HF_DYNFILE_INSTR_COUNT;
break;
case 0x511:
hfuzz->dynFileMethod |= _HF_DYNFILE_BRANCH_COUNT;
break;
case 0x513:
hfuzz->dynFileMethod |= _HF_DYNFILE_BTS_EDGE;
break;
case 0x514:
hfuzz->dynFileMethod |= _HF_DYNFILE_IPT_BLOCK;
break;
case 0x515:
hfuzz->linux.kernelOnly = true;
break;
case 0x530:
hfuzz->linux.cloneFlags |= (CLONE_NEWUSER | CLONE_NEWNET);
break;
case 0x531:
hfuzz->linux.cloneFlags |= (CLONE_NEWUSER | CLONE_NEWPID);
break;
case 0x532:
hfuzz->linux.cloneFlags |= (CLONE_NEWUSER | CLONE_NEWIPC);
break;
#endif /* defined(_HF_ARCH_LINUX) */
default:
cmdlineUsage(argv[0], custom_opts);
return false;
break;
}
}
if (!logInitLogFile(logfile, ll)) {
return false;
}
hfuzz->exe.argc = argc - optind;
hfuzz->exe.cmdline = (const char* const*)&argv[optind];
if (hfuzz->exe.argc <= 0) {
LOG_E("No fuzz command provided");
cmdlineUsage(argv[0], custom_opts);
return false;
}
if (!cmdlineVerify(hfuzz)) {
return false;
}
LOG_I(
"PID: %d, inputDir '%s', nullifyStdio: %s, fuzzStdin: %s, saveUnique: %s, "
"mutationsPerRun: %u, "
"externalCommand: '%s', runEndTime: %d tmOut: %ld, mutationsMax: %zu, "
"threads.threadsMax: %zu, "
"fileExtn: '%s', "
"ASLimit: 0x%" PRIx64 "(MiB), RSSLimit: 0x%" PRIx64 ", DATALimit: 0x%" PRIx64
", fuzzExe: '%s', fuzzedPid: %d, monitorSIGABRT: '%s'",
(int)getpid(), hfuzz->io.inputDir, cmdlineYesNo(hfuzz->exe.nullifyStdio),
cmdlineYesNo(hfuzz->exe.fuzzStdin), cmdlineYesNo(hfuzz->io.saveUnique),
hfuzz->mutationsPerRun,
hfuzz->exe.externalCommand == NULL ? "NULL" : hfuzz->exe.externalCommand,
(int)hfuzz->timing.runEndTime, (long)hfuzz->timing.tmOut, hfuzz->mutationsMax,
hfuzz->threads.threadsMax, hfuzz->io.fileExtn, hfuzz->exe.asLimit, hfuzz->exe.rssLimit,
hfuzz->exe.dataLimit, hfuzz->exe.cmdline[0], hfuzz->linux.pid,
cmdlineYesNo(hfuzz->monitorSIGABRT));
snprintf(hfuzz->cmdline_txt, sizeof(hfuzz->cmdline_txt), "%s", hfuzz->exe.cmdline[0]);
for (size_t i = 1; hfuzz->exe.cmdline[i]; i++) {
util_ssnprintf(
hfuzz->cmdline_txt, sizeof(hfuzz->cmdline_txt), " %s", hfuzz->exe.cmdline[i]);
if (strlen(hfuzz->cmdline_txt) == (sizeof(hfuzz->cmdline_txt) - 1)) {
hfuzz->cmdline_txt[sizeof(hfuzz->cmdline_txt) - 5] = ' ';
hfuzz->cmdline_txt[sizeof(hfuzz->cmdline_txt) - 4] = '.';
hfuzz->cmdline_txt[sizeof(hfuzz->cmdline_txt) - 3] = '.';
hfuzz->cmdline_txt[sizeof(hfuzz->cmdline_txt) - 2] = '.';
hfuzz->cmdline_txt[sizeof(hfuzz->cmdline_txt) - 1] = '\0';
}
}
return true;
}