blob: 2b9f33bc83e58b28df866079977be2b1032d91aa [file] [log] [blame]
Robert Swieckia88f96f2015-10-09 16:47:39 +02001/*
2
3 honggfuzz - cmdline parsing
4
5 -----------------------------------------
6
7 Copyright 2014 Google Inc. All Rights Reserved.
8
9 Licensed under the Apache License, Version 2.0 (the "License");
10 you may not use this file except in compliance with the License.
11 You may obtain a copy of the License at
12
13 http://www.apache.org/licenses/LICENSE-2.0
14
15 Unless required by applicable law or agreed to in writing, software
16 distributed under the License is distributed on an "AS IS" BASIS,
17 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
18 See the License for the specific language governing permissions and
19 limitations under the License.
20
21*/
22
23#include "cmdline.h"
24
25#include <ctype.h>
26#include <errno.h>
27#include <getopt.h>
Robert Swieckia88f96f2015-10-09 16:47:39 +020028#include <inttypes.h>
29#include <limits.h>
Robert Swiecki846ccd72017-01-12 17:52:23 +010030#if defined(_HF_ARCH_LINUX)
31#include <sched.h>
32#endif /* defined(_HF_ARCH_LINUX) */
33#include <signal.h>
Robert Swieckia88f96f2015-10-09 16:47:39 +020034#include <stdlib.h>
35#include <stdio.h>
36#include <string.h>
Robert Swiecki3bfc33c2016-03-14 18:12:41 +010037#include <sys/queue.h>
Robert Swieckia88f96f2015-10-09 16:47:39 +020038#include <unistd.h>
39
Robert Swiecki241a7412017-05-24 01:53:15 +020040#include "libcommon/common.h"
41#include "libcommon/log.h"
42#include "libcommon/files.h"
43#include "libcommon/util.h"
Robert Swieckia88f96f2015-10-09 16:47:39 +020044
45struct custom_option {
46 struct option opt;
47 const char *descr;
48};
49
50static bool checkFor_FILE_PLACEHOLDER(char **args)
51{
52 for (int x = 0; args[x]; x++) {
53 if (strstr(args[x], _HF_FILE_PLACEHOLDER))
54 return true;
55 }
56 return false;
57}
58
59static const char *cmdlineYesNo(bool yes)
60{
61 return (yes ? "true" : "false");
62}
63
64static void cmdlineHelp(const char *pname, struct custom_option *opts)
65{
66 LOG_HELP_BOLD("Usage: %s [options] -- path_to_command [args]", pname);
67 LOG_HELP_BOLD("Options:");
68 for (int i = 0; opts[i].opt.name; i++) {
Robert Swieckif3a5f6a2016-03-16 14:47:30 +010069 if (isprint(opts[i].opt.val) && opts[i].opt.val < 0x80) {
Robert Swieckia88f96f2015-10-09 16:47:39 +020070 LOG_HELP_BOLD(" --%s%s%c %s", opts[i].opt.name,
71 "|-", opts[i].opt.val,
Robert Swieckibf063db2016-02-16 18:42:00 +010072 opts[i].opt.has_arg == required_argument ? "VALUE" : "");
Robert Swieckia88f96f2015-10-09 16:47:39 +020073 } else {
74 LOG_HELP_BOLD(" --%s %s", opts[i].opt.name,
Robert Swieckibf063db2016-02-16 18:42:00 +010075 opts[i].opt.has_arg == required_argument ? "VALUE" : "");
Robert Swieckia88f96f2015-10-09 16:47:39 +020076 }
77 LOG_HELP("\t%s", opts[i].descr);
78 }
Jagger32127372015-10-09 23:07:38 +020079 LOG_HELP_BOLD("\nExamples:");
80 LOG_HELP(" Run the binary over a mutated file chosen from the directory");
81 LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -- /usr/bin/tiffinfo -D " _HF_FILE_PLACEHOLDER);
82 LOG_HELP(" As above, provide input over STDIN:");
Robert Swiecki72d2bef2016-01-19 14:39:26 +010083 LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -s -- /usr/bin/djpeg");
Jaggerba92b4b2016-03-16 02:24:17 +010084 LOG_HELP(" Use SANCOV to maximize code coverage:");
85 LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -C -- /usr/bin/tiffinfo -D " _HF_FILE_PLACEHOLDER);
Jaggere848cc72016-09-19 02:28:52 +020086 LOG_HELP(" Use compile-time instrumentation (libhfuzz/instrument.c):");
87 LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -z -- /usr/bin/tiffinfo -D " _HF_FILE_PLACEHOLDER);
Robert Swieckia2d5be32016-10-11 22:52:42 +020088 LOG_HELP(" Use persistent mode (libhfuzz/persistent.c):");
Jaggere848cc72016-09-19 02:28:52 +020089 LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -P -- /usr/bin/tiffinfo_persistent");
Robert Swiecki43f0b282016-11-01 18:06:40 +010090 LOG_HELP
91 (" Use persistent mode (libhfuzz/persistent.c) and compile-time instrumentation (libhfuzz/instrument.c):");
Robert Swiecki14129492016-11-01 18:04:32 +010092 LOG_HELP_BOLD(" " PROG_NAME " -f input_dir -P -z -- /usr/bin/tiffinfo_persistent");
Robert Swieckia88f96f2015-10-09 16:47:39 +020093#if defined(_HF_ARCH_LINUX)
Jagger32127372015-10-09 23:07:38 +020094 LOG_HELP(" Run the binary over a dynamic file, maximize total no. of instructions:");
Jagger72f258b2015-10-09 23:09:01 +020095 LOG_HELP_BOLD(" " PROG_NAME " --linux_perf_instr -- /usr/bin/tiffinfo -D "
96 _HF_FILE_PLACEHOLDER);
Jagger32127372015-10-09 23:07:38 +020097 LOG_HELP(" Run the binary over a dynamic file, maximize total no. of branches:");
Jagger72f258b2015-10-09 23:09:01 +020098 LOG_HELP_BOLD(" " PROG_NAME " --linux_perf_branch -- /usr/bin/tiffinfo -D "
99 _HF_FILE_PLACEHOLDER);
Robert Swiecki349cb9e2016-10-14 21:36:42 +0200100 LOG_HELP(" Run the binary over a dynamic file, maximize unique code blocks via BTS:");
101 LOG_HELP_BOLD(" " PROG_NAME " --linux_perf_bts_block -- /usr/bin/tiffinfo -D "
102 _HF_FILE_PLACEHOLDER);
103 LOG_HELP(" Run the binary over a dynamic file, maximize unique branches (edges) via BTS:");
Robert Swiecki43f0b282016-11-01 18:06:40 +0100104 LOG_HELP_BOLD(" " PROG_NAME " --linux_perf_bts_edge -- /usr/bin/tiffinfo -D "
105 _HF_FILE_PLACEHOLDER);
Robert Swiecki349cb9e2016-10-14 21:36:42 +0200106 LOG_HELP
Robert Swiecki8499c662016-11-01 18:02:52 +0100107 (" Run the binary over a dynamic file, maximize unique code blocks via Intel Processor Trace (requires libipt.so):");
Robert Swiecki349cb9e2016-10-14 21:36:42 +0200108 LOG_HELP_BOLD(" " PROG_NAME " --linux_perf_ipt_block -- /usr/bin/tiffinfo -D "
Jagger72f258b2015-10-09 23:09:01 +0200109 _HF_FILE_PLACEHOLDER);
Robert Swieckia88f96f2015-10-09 16:47:39 +0200110#endif /* defined(_HF_ARCH_LINUX) */
Robert Swieckia88f96f2015-10-09 16:47:39 +0200111}
112
113static void cmdlineUsage(const char *pname, struct custom_option *opts)
114{
115 cmdlineHelp(pname, opts);
116 exit(0);
117}
118
Robert Swieckia88f96f2015-10-09 16:47:39 +0200119rlim_t cmdlineParseRLimit(int res, const char *optarg, unsigned long mul)
120{
121 struct rlimit cur;
122 if (getrlimit(res, &cur) == -1) {
123 PLOG_F("getrlimit(%d)", res);
124 }
125 if (strcasecmp(optarg, "max") == 0) {
126 return cur.rlim_max;
127 }
128 if (strcasecmp(optarg, "def") == 0) {
129 return cur.rlim_cur;
130 }
Anestis Bechtsoudis413cb132016-02-07 12:59:00 +0200131 if (util_isANumber(optarg) == false) {
Robert Swieckia88f96f2015-10-09 16:47:39 +0200132 LOG_F("RLIMIT %d needs a numeric or 'max'/'def' value ('%s' provided)", res, optarg);
133 }
134 rlim_t val = strtoul(optarg, NULL, 0) * mul;
Jagger2bd61b72015-10-10 05:23:32 +0200135 if ((unsigned long)val == ULONG_MAX && errno != 0) {
Robert Swieckia88f96f2015-10-09 16:47:39 +0200136 PLOG_F("strtoul('%s', 0)", optarg);
137 }
138 return val;
139}
140
141bool cmdlineParse(int argc, char *argv[], honggfuzz_t * hfuzz)
142{
143 /* *INDENT-OFF* */
144 (*hfuzz) = (honggfuzz_t) {
145 .cmdline = NULL,
Robert Swiecki72d2bef2016-01-19 14:39:26 +0100146 .cmdline_txt[0] = '\0',
Jagger1b2d4822016-09-25 16:19:45 +0200147 .inputDir = NULL,
Robert Swiecki92a31362017-02-24 16:21:40 +0100148 .inputDirP = NULL,
149 .fileCnt = 0,
150 .fileCntDone = false,
Robert Swiecki4332ae92017-05-23 23:06:04 +0200151 .nullifyStdio = true,
Robert Swieckia88f96f2015-10-09 16:47:39 +0200152 .fuzzStdin = false,
153 .saveUnique = true,
Robert Swiecki6c9f6822016-03-14 16:12:27 +0100154 .useScreen = true,
155 .useVerifier = false,
156 .timeStart = time(NULL),
Robert Swieckia88f96f2015-10-09 16:47:39 +0200157 .fileExtn = "fuzz",
158 .workDir = ".",
Jagger1b2d4822016-09-25 16:19:45 +0200159 .covDir = NULL,
Robert Swieckia96d78d2016-03-14 16:50:50 +0100160 .origFlipRate = 0.001f,
Robert Swieckia88f96f2015-10-09 16:47:39 +0200161 .externalCommand = NULL,
Robert Swieckiee266ac2016-10-03 02:25:59 +0200162 .postExternalCommand = NULL,
Robert Swieckia88f96f2015-10-09 16:47:39 +0200163 .blacklistFile = NULL,
164 .blacklistCnt = 0,
165 .blacklist = NULL,
Jaggerf4a60562016-09-25 15:40:23 +0200166 .maxFileSz = 0UL,
Jaggerba92b4b2016-03-16 02:24:17 +0100167 .tmOut = 10,
Robert Swieckia88f96f2015-10-09 16:47:39 +0200168 .mutationsMax = 0,
169 .threadsFinished = 0,
Jagger2664f542016-09-28 14:37:00 +0200170 .threadsMax = (sysconf(_SC_NPROCESSORS_ONLN) <= 1) ? 1 : sysconf(_SC_NPROCESSORS_ONLN) / 2,
Robert Swieckia88f96f2015-10-09 16:47:39 +0200171 .reportFile = NULL,
172 .asLimit = 0ULL,
Jagger80041fe2016-03-10 21:32:35 +0100173 .clearEnv = false,
Jaggerab26e702016-03-22 04:28:00 +0100174 .envs = {
175 [0 ... (ARRAYSIZE(hfuzz->envs) - 1)] = NULL,
176 },
Robert Swiecki0f937af2016-03-30 18:19:16 +0200177 .persistent = false,
Robert Swieckie84b6452016-12-12 12:42:04 +0100178 .tmout_vtalrm = false,
Robert Swiecki44f6b192017-02-15 20:24:55 +0100179 .skipFeedbackOnTimeout = false,
Anestis Bechtsoudise5f09f82016-12-27 16:06:05 +0200180 .enableSanitizers = false,
181#if defined(__ANDROID__)
182 .monitorSIGABRT = false,
183#else
184 .monitorSIGABRT = true,
185#endif
Robert Swiecki0ec98112017-02-03 02:08:14 +0100186 .threadsActiveCnt = 0,
Robert Swiecki89b84472017-02-12 22:20:10 +0100187 .mainPid = getpid(),
Robert Swiecki8d01b012017-02-19 15:48:11 +0100188 .terminating = false,
Robert Swieckia88f96f2015-10-09 16:47:39 +0200189
Robert Swiecki531438a2016-09-13 19:05:11 +0200190 .dictionaryFile = NULL,
191 .dictionaryCnt = 0,
Robert Swiecki9f5f9432017-03-09 01:48:04 +0100192 .dictqCurrent = NULL,
Robert Swiecki531438a2016-09-13 19:05:11 +0200193
Robert Swiecki6c9f6822016-03-14 16:12:27 +0100194 .state = _HF_STATE_UNSET,
Jaggerb7fa3ee2016-08-21 19:46:26 +0200195 .feedback = NULL,
Robert Swieckibc7532e2016-08-20 00:34:17 +0200196 .bbFd = -1,
Robert Swiecki9f5f9432017-03-09 01:48:04 +0100197
Robert Swieckie586c1f2016-03-14 18:46:03 +0100198 .dynfileq_mutex = PTHREAD_MUTEX_INITIALIZER,
Robert Swiecki3bfc33c2016-03-14 18:12:41 +0100199 .dynfileqCnt = 0U,
Robert Swiecki9f5f9432017-03-09 01:48:04 +0100200 .dynfileqCurrent = NULL,
Robert Swiecki6c9f6822016-03-14 16:12:27 +0100201
Robert Swiecki37498fd2017-03-12 21:12:54 +0100202 .feedback_mutex = PTHREAD_MUTEX_INITIALIZER,
203
Robert Swieckia88f96f2015-10-09 16:47:39 +0200204 .mutationsCnt = 0,
205 .crashesCnt = 0,
206 .uniqueCrashesCnt = 0,
Anestis Bechtsoudis79b799e2015-11-01 00:02:25 +0200207 .verifiedCrashesCnt = 0,
Robert Swieckia88f96f2015-10-09 16:47:39 +0200208 .blCrashesCnt = 0,
209 .timeoutedCnt = 0,
210
Robert Swiecki6c9f6822016-03-14 16:12:27 +0100211 .dynFileMethod = _HF_DYNFILE_NONE,
Anestis Bechtsoudisbe0ac7b2015-12-26 15:38:47 +0200212 .sanCovCnts = {
Jaggerab26e702016-03-22 04:28:00 +0100213 .hitBBCnt = 0ULL,
214 .totalBBCnt = 0ULL,
215 .dsoCnt = 0ULL,
216 .iDsoCnt = 0ULL,
217 .newBBCnt = 0ULL,
218 .crashesCnt = 0ULL,
219 },
Robert Swieckia88f96f2015-10-09 16:47:39 +0200220
Anestis Bechtsoudisa16f70f2016-01-03 13:03:21 +0200221 .sanCov_mutex = PTHREAD_MUTEX_INITIALIZER,
Robert Swiecki23ec02a2016-01-19 18:47:45 +0100222 .sanOpts = {
Jaggerab26e702016-03-22 04:28:00 +0100223 .asanOpts = NULL,
224 .msanOpts = NULL,
225 .ubsanOpts = NULL,
Anestis Bechtsoudis61b5ab12016-01-08 16:07:02 +0200226 },
Robert Swiecki6c9f6822016-03-14 16:12:27 +0100227 .useSanCov = false,
Robert Swiecki6c9f6822016-03-14 16:12:27 +0100228 .covMetadata = NULL,
Jagger247c3b42016-03-21 23:24:05 +0100229 .msanReportUMRS = false,
Robert Swiecki6c9f6822016-03-14 16:12:27 +0100230
Haris Andrianakisc9a71332016-05-09 21:56:30 -0700231 .report_mutex = PTHREAD_MUTEX_INITIALIZER,
232
Robert Swiecki6c9f6822016-03-14 16:12:27 +0100233 /* Linux code */
Robert Swieckifab69162016-03-31 15:41:36 +0200234 .linux = {
Jaggerab26e702016-03-22 04:28:00 +0100235 .hwCnts = {
236 .cpuInstrCnt = 0ULL,
237 .cpuBranchCnt = 0ULL,
Jaggerab26e702016-03-22 04:28:00 +0100238 .bbCnt = 0ULL,
239 .newBBCnt = 0ULL,
Jagger34789a72016-09-08 00:36:09 +0200240 .softCntPc = 0ULL,
241 .softCntCmp = 0ULL,
Jaggerab26e702016-03-22 04:28:00 +0100242 },
243 .dynamicCutOffAddr = ~(0ULL),
244 .disableRandomization = true,
245 .ignoreAddr = NULL,
246 .numMajorFrames = 7,
247 .pid = 0,
248 .pidFile = NULL,
249 .pidCmd = NULL,
Anestis Bechtsoudisba68b382016-10-29 20:44:15 +0300250 .symsBlFile = NULL,
251 .symsBlCnt = 0,
252 .symsBl = NULL,
253 .symsWlFile = NULL,
254 .symsWlCnt = 0,
255 .symsWl = NULL,
Robert Swiecki846ccd72017-01-12 17:52:23 +0100256 .cloneFlags = 0,
Robert Swiecki37d27ca2017-03-30 14:43:54 +0200257 .kernelOnly = false,
Jaggerab26e702016-03-22 04:28:00 +0100258 },
Robert Swieckia88f96f2015-10-09 16:47:39 +0200259 };
260 /* *INDENT-ON* */
261
Robert Swieckiafb16102017-03-13 22:14:31 +0100262 TAILQ_INIT(&hfuzz->dynfileq);
263 TAILQ_INIT(&hfuzz->dictq);
Robert Swiecki3bfc33c2016-03-14 18:12:41 +0100264
Robert Swieckia88f96f2015-10-09 16:47:39 +0200265 /* *INDENT-OFF* */
266 struct custom_option custom_opts[] = {
267 {{"help", no_argument, NULL, 'h'}, "Help plz.."},
Jagger1b2d4822016-09-25 16:19:45 +0200268 {{"input", required_argument, NULL, 'f'}, "Path to a directory containing initial file corpus"},
Robert Swieckiebdb2a52017-05-23 23:00:56 +0200269 {{"persistent", no_argument, NULL, 'P'}, "Enable persistent fuzzing (use hfuzz_cc/hfuzz-clang to compile code)"},
270 {{"instrument", no_argument, NULL, 'z'}, "Enable compile-time instrumentation (use hfuzz_cc/hfuzz-clang to compile code)"},
271 {{"sancov", no_argument, NULL, 'C'}, "Enable sanitizer coverage feedback"},
Robert Swiecki4332ae92017-05-23 23:06:04 +0200272 {{"keep_output", no_argument, NULL, 'Q'}, "Don't close children's stdin, stdout, stderr; can be noisy"},
Jagger54c96a22016-03-30 23:13:30 +0200273 {{"timeout", required_argument, NULL, 't'}, "Timeout in seconds (default: '10')"},
Jagger2664f542016-09-28 14:37:00 +0200274 {{"threads", required_argument, NULL, 'n'}, "Number of concurrent fuzzing threads (default: number of CPUs / 2)"},
Robert Swieckia88f96f2015-10-09 16:47:39 +0200275 {{"stdin_input", no_argument, NULL, 's'}, "Provide fuzzing input on STDIN, instead of ___FILE___"},
Jagger54c96a22016-03-30 23:13:30 +0200276 {{"mutation_rate", required_argument, NULL, 'r'}, "Maximal mutation rate in relation to the file size, (default: '0.001')"},
Robert Swiecki03ef5312015-10-09 18:25:40 +0200277 {{"logfile", required_argument, NULL, 'l'}, "Log file"},
Robert Swieckia88f96f2015-10-09 16:47:39 +0200278 {{"verbose", no_argument, NULL, 'v'}, "Disable ANSI console; use simple log output"},
Jagger5ff08ac2016-02-09 22:15:58 +0100279 {{"verifier", no_argument, NULL, 'V'}, "Enable crashes verifier"},
Robert Swieckia88f96f2015-10-09 16:47:39 +0200280 {{"debug_level", required_argument, NULL, 'd'}, "Debug level (0 - FATAL ... 4 - DEBUG), (default: '3' [INFO])"},
281 {{"extension", required_argument, NULL, 'e'}, "Input file extension (e.g. 'swf'), (default: 'fuzz')"},
Anestis Bechtsoudisbfcba122016-04-28 10:55:20 +0300282 {{"workspace", required_argument, NULL, 'W'}, "Workspace directory to save crashes & runtime files (default: '.')"},
Robert Swieckid32018f2016-10-11 22:58:22 +0200283 {{"covdir", required_argument, NULL, 0x103}, "New coverage is written to a separate directory (default: use the input directory)"},
Robert Swieckia88f96f2015-10-09 16:47:39 +0200284 {{"wordlist", required_argument, NULL, 'w'}, "Wordlist file (tokens delimited by NUL-bytes)"},
285 {{"stackhash_bl", required_argument, NULL, 'B'}, "Stackhashes blacklist file (one entry per line)"},
Robert Swieckiee266ac2016-10-03 02:25:59 +0200286 {{"mutate_cmd", required_argument, NULL, 'c'}, "External command producing fuzz files (instead of internal mutators)"},
287 {{"pprocess_cmd", required_argument, NULL, 0x104}, "External command postprocessing files produced by internal mutators"},
Robert Swieckia88f96f2015-10-09 16:47:39 +0200288 {{"iterations", required_argument, NULL, 'N'}, "Number of fuzzing iterations (default: '0' [no limit])"},
Robert Swiecki03ef5312015-10-09 18:25:40 +0200289 {{"rlimit_as", required_argument, NULL, 0x100}, "Per process memory limit in MiB (default: '0' [no limit])"},
dyjakanebfd24e2015-10-16 19:24:32 +0100290 {{"report", required_argument, NULL, 'R'}, "Write report to this file (default: '" _HF_REPORT_FILE "')"},
Robert Swieckia88f96f2015-10-09 16:47:39 +0200291 {{"max_file_size", required_argument, NULL, 'F'}, "Maximal size of files processed by the fuzzer in bytes (default: '1048576')"},
Jagger80041fe2016-03-10 21:32:35 +0100292 {{"clear_env", no_argument, NULL, 0x101}, "Clear all environment variables before executing the binary"},
Robert Swieckia88f96f2015-10-09 16:47:39 +0200293 {{"env", required_argument, NULL, 'E'}, "Pass this environment variable, can be used multiple times"},
Jagger54c96a22016-03-30 23:13:30 +0200294 {{"save_all", no_argument, NULL, 'u'}, "Save all test-cases (not only the unique ones) by appending the current time-stamp to the filenames"},
Jagger7ff92fa2016-03-22 04:13:50 +0100295 {{"msan_report_umrs", no_argument, NULL, 0x102}, "Report MSAN's UMRS (uninitialized memory access)"},
Gergely Nagy5d47c732016-12-12 23:51:51 +0100296 {{"tmout_sigvtalrm", no_argument, NULL, 'T'}, "Use SIGVTALRM to kill timeouting processes (default: use SIGKILL)"},
Anestis Bechtsoudise5f09f82016-12-27 16:06:05 +0200297 {{"sanitizers", no_argument, NULL, 'S'}, "Enable sanitizers settings (default: false)"},
298 {{"monitor_sigabrt", required_argument, NULL, 0x105}, "Monitor SIGABRT (default: 'false for Android - 'true for other platforms)"},
Robert Swiecki44f6b192017-02-15 20:24:55 +0100299 {{"no_fb_timeout", required_argument, NULL, 0x106}, "Skip feedback if the process has timeouted (default: 'false')"},
Robert Swieckia88f96f2015-10-09 16:47:39 +0200300
301#if defined(_HF_ARCH_LINUX)
Anestis Bechtsoudisfafb3332016-10-31 08:57:16 +0200302 {{"linux_symbols_bl", required_argument, NULL, 0x504}, "Symbols blacklist filter file (one entry per line)"},
303 {{"linux_symbols_wl", required_argument, NULL, 0x505}, "Symbols whitelist filter file (one entry per line)"},
Anestis Bechtsoudis413cb132016-02-07 12:59:00 +0200304 {{"linux_pid", required_argument, NULL, 'p'}, "Attach to a pid (and its thread group)"},
Robert Swieckifab69162016-03-31 15:41:36 +0200305 {{"linux_file_pid", required_argument, NULL, 0x502}, "Attach to pid (and its thread group) read from file"},
Robert Swieckia88f96f2015-10-09 16:47:39 +0200306 {{"linux_addr_low_limit", required_argument, NULL, 0x500}, "Address limit (from si.si_addr) below which crashes are not reported, (default: '0')"},
307 {{"linux_keep_aslr", no_argument, NULL, 0x501}, "Don't disable ASLR randomization, might be useful with MSAN"},
Jaggerae6a4452015-10-14 17:34:43 +0200308 {{"linux_perf_ignore_above", required_argument, NULL, 0x503}, "Ignore perf events which report IPs above this address"},
Robert Swieckia88f96f2015-10-09 16:47:39 +0200309 {{"linux_perf_instr", no_argument, NULL, 0x510}, "Use PERF_COUNT_HW_INSTRUCTIONS perf"},
310 {{"linux_perf_branch", no_argument, NULL, 0x511}, "Use PERF_COUNT_HW_BRANCH_INSTRUCTIONS perf"},
Jagger39bd2b02016-02-04 01:16:15 +0100311 {{"linux_perf_bts_block", no_argument, NULL, 0x512}, "Use Intel BTS to count unique blocks"},
312 {{"linux_perf_bts_edge", no_argument, NULL, 0x513}, "Use Intel BTS to count unique edges"},
Robert Swiecki8499c662016-11-01 18:02:52 +0100313 {{"linux_perf_ipt_block", no_argument, NULL, 0x514}, "Use Intel Processor Trace to count unique blocks (requires libipt.so)"},
Robert Swiecki37d27ca2017-03-30 14:43:54 +0200314 {{"linux_perf_kernel_only", no_argument, NULL, 0x515}, "Gather kernel-only coverage with Intel PT and with Intel BTS"},
Robert Swiecki846ccd72017-01-12 17:52:23 +0100315 {{"linux_ns_net", no_argument, NULL, 0x0530}, "Use Linux NET namespace isolation"},
316 {{"linux_ns_pid", no_argument, NULL, 0x0531}, "Use Linux PID namespace isolation"},
317 {{"linux_ns_ipc", no_argument, NULL, 0x0532}, "Use Linux IPC namespace isolation"},
Robert Swieckia88f96f2015-10-09 16:47:39 +0200318#endif // defined(_HF_ARCH_LINUX)
319 {{0, 0, 0, 0}, NULL},
320 };
321 /* *INDENT-ON* */
322
323 struct option opts[ARRAYSIZE(custom_opts)];
324 for (unsigned i = 0; i < ARRAYSIZE(custom_opts); i++) {
325 opts[i] = custom_opts[i].opt;
326 }
327
328 enum llevel_t ll = INFO;
329 const char *logfile = NULL;
330 int opt_index = 0;
331 for (;;) {
Robert Swiecki4332ae92017-05-23 23:06:04 +0200332 int c = getopt_long(argc, argv, "-?hQvVsuPf:d:e:W:r:c:F:t:R:n:N:l:p:g:E:w:B:CzTS", opts,
Robert Swieckia88f96f2015-10-09 16:47:39 +0200333 &opt_index);
334 if (c < 0)
335 break;
336
337 switch (c) {
338 case 'h':
339 case '?':
340 cmdlineUsage(argv[0], custom_opts);
341 break;
342 case 'f':
Jagger1b2d4822016-09-25 16:19:45 +0200343 hfuzz->inputDir = optarg;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200344 break;
Robert Swiecki4332ae92017-05-23 23:06:04 +0200345 case 'Q':
346 hfuzz->nullifyStdio = false;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200347 break;
348 case 'v':
349 hfuzz->useScreen = false;
350 break;
Anestis Bechtsoudis0cde66f2015-10-11 19:37:11 -0700351 case 'V':
352 hfuzz->useVerifier = true;
353 break;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200354 case 's':
355 hfuzz->fuzzStdin = true;
356 break;
357 case 'u':
358 hfuzz->saveUnique = false;
359 break;
Robert Swiecki03ef5312015-10-09 18:25:40 +0200360 case 'l':
361 logfile = optarg;
362 break;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200363 case 'd':
364 ll = atoi(optarg);
365 break;
366 case 'e':
367 hfuzz->fileExtn = optarg;
368 break;
369 case 'W':
370 hfuzz->workDir = optarg;
371 break;
372 case 'r':
Robert Swieckia96d78d2016-03-14 16:50:50 +0100373 hfuzz->origFlipRate = strtod(optarg, NULL);
Robert Swieckia88f96f2015-10-09 16:47:39 +0200374 break;
375 case 'c':
376 hfuzz->externalCommand = optarg;
377 break;
Anestis Bechtsoudisbe0ac7b2015-12-26 15:38:47 +0200378 case 'C':
379 hfuzz->useSanCov = true;
380 break;
Anestis Bechtsoudise5f09f82016-12-27 16:06:05 +0200381 case 'S':
382 hfuzz->enableSanitizers = true;
383 break;
Jagger4aac9fe2016-08-28 17:35:48 +0200384 case 'z':
385 hfuzz->dynFileMethod |= _HF_DYNFILE_SOFT;
386 break;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200387 case 'F':
388 hfuzz->maxFileSz = strtoul(optarg, NULL, 0);
389 break;
390 case 't':
391 hfuzz->tmOut = atol(optarg);
392 break;
393 case 'R':
394 hfuzz->reportFile = optarg;
395 break;
396 case 'n':
397 hfuzz->threadsMax = atol(optarg);
398 break;
399 case 'N':
400 hfuzz->mutationsMax = atol(optarg);
401 break;
Robert Swiecki03ef5312015-10-09 18:25:40 +0200402 case 0x100:
Robert Swieckia88f96f2015-10-09 16:47:39 +0200403 hfuzz->asLimit = strtoull(optarg, NULL, 0);
404 break;
Jagger80041fe2016-03-10 21:32:35 +0100405 case 0x101:
406 hfuzz->clearEnv = true;
407 break;
Jagger7ff92fa2016-03-22 04:13:50 +0100408 case 0x102:
409 hfuzz->msanReportUMRS = true;
410 break;
Robert Swieckidac8cf12016-09-22 15:36:28 +0200411 case 0x103:
Jagger1b2d4822016-09-25 16:19:45 +0200412 hfuzz->covDir = optarg;
Robert Swieckidac8cf12016-09-22 15:36:28 +0200413 break;
Robert Swieckiee266ac2016-10-03 02:25:59 +0200414 case 0x104:
415 hfuzz->postExternalCommand = optarg;
416 break;
Anestis Bechtsoudise5f09f82016-12-27 16:06:05 +0200417 case 0x105:
418 if ((strcasecmp(optarg, "0") == 0) || (strcasecmp(optarg, "false") == 0)) {
419 hfuzz->monitorSIGABRT = false;
420 } else {
421 hfuzz->monitorSIGABRT = true;
422 }
423 break;
Robert Swiecki44f6b192017-02-15 20:24:55 +0100424 case 0x106:
425 hfuzz->skipFeedbackOnTimeout = true;
426 break;
Robert Swieckifab69162016-03-31 15:41:36 +0200427 case 'P':
Robert Swiecki0f937af2016-03-30 18:19:16 +0200428 hfuzz->persistent = true;
429 break;
Gergely Nagy5d47c732016-12-12 23:51:51 +0100430 case 'T':
Robert Swieckie84b6452016-12-12 12:42:04 +0100431 hfuzz->tmout_vtalrm = true;
432 break;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200433 case 'p':
Anestis Bechtsoudis413cb132016-02-07 12:59:00 +0200434 if (util_isANumber(optarg) == false) {
Jagger9c4d1622015-10-16 01:40:17 +0200435 LOG_E("-p '%s' is not a number", optarg);
436 return false;
437 }
Jagger247c3b42016-03-21 23:24:05 +0100438 hfuzz->linux.pid = atoi(optarg);
439 if (hfuzz->linux.pid < 1) {
440 LOG_E("-p '%d' is invalid", hfuzz->linux.pid);
Jagger9c4d1622015-10-16 01:40:17 +0200441 return false;
442 }
Robert Swieckia88f96f2015-10-09 16:47:39 +0200443 break;
Robert Swieckifab69162016-03-31 15:41:36 +0200444 case 0x502:
Jagger247c3b42016-03-21 23:24:05 +0100445 hfuzz->linux.pidFile = optarg;
Anestis Bechtsoudis413cb132016-02-07 12:59:00 +0200446 break;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200447 case 'E':
448 for (size_t i = 0; i < ARRAYSIZE(hfuzz->envs); i++) {
449 if (hfuzz->envs[i] == NULL) {
450 hfuzz->envs[i] = optarg;
451 break;
452 }
453 }
454 break;
455 case 'w':
456 hfuzz->dictionaryFile = optarg;
457 break;
458 case 'B':
459 hfuzz->blacklistFile = optarg;
460 break;
Robert Swiecki846ccd72017-01-12 17:52:23 +0100461#if defined(_HF_ARCH_LINUX)
Robert Swieckia88f96f2015-10-09 16:47:39 +0200462 case 0x500:
Jagger247c3b42016-03-21 23:24:05 +0100463 hfuzz->linux.ignoreAddr = (void *)strtoul(optarg, NULL, 0);
Robert Swieckia88f96f2015-10-09 16:47:39 +0200464 break;
465 case 0x501:
Jagger247c3b42016-03-21 23:24:05 +0100466 hfuzz->linux.disableRandomization = false;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200467 break;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200468 case 0x503:
Jagger247c3b42016-03-21 23:24:05 +0100469 hfuzz->linux.dynamicCutOffAddr = strtoull(optarg, NULL, 0);
Robert Swieckia88f96f2015-10-09 16:47:39 +0200470 break;
Anestis Bechtsoudisba68b382016-10-29 20:44:15 +0300471 case 0x504:
472 hfuzz->linux.symsBlFile = optarg;
473 break;
474 case 0x505:
475 hfuzz->linux.symsWlFile = optarg;
476 break;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200477 case 0x510:
478 hfuzz->dynFileMethod |= _HF_DYNFILE_INSTR_COUNT;
479 break;
480 case 0x511:
481 hfuzz->dynFileMethod |= _HF_DYNFILE_BRANCH_COUNT;
482 break;
483 case 0x512:
Jagger3abc5602016-02-04 00:53:43 +0100484 hfuzz->dynFileMethod |= _HF_DYNFILE_BTS_BLOCK;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200485 break;
486 case 0x513:
Jagger3abc5602016-02-04 00:53:43 +0100487 hfuzz->dynFileMethod |= _HF_DYNFILE_BTS_EDGE;
Robert Swieckia88f96f2015-10-09 16:47:39 +0200488 break;
489 case 0x514:
Jagger39bd2b02016-02-04 01:16:15 +0100490 hfuzz->dynFileMethod |= _HF_DYNFILE_IPT_BLOCK;
491 break;
Robert Swiecki37d27ca2017-03-30 14:43:54 +0200492 case 0x515:
493 hfuzz->linux.kernelOnly = true;
494 break;
Robert Swiecki846ccd72017-01-12 17:52:23 +0100495 case 0x530:
496 hfuzz->linux.cloneFlags |= (CLONE_NEWUSER | CLONE_NEWNET);
497 break;
498 case 0x531:
499 hfuzz->linux.cloneFlags |= (CLONE_NEWUSER | CLONE_NEWPID);
500 break;
501 case 0x532:
502 hfuzz->linux.cloneFlags |= (CLONE_NEWUSER | CLONE_NEWIPC);
503 break;
504#endif /* defined(_HF_ARCH_LINUX) */
Robert Swieckia88f96f2015-10-09 16:47:39 +0200505 default:
506 cmdlineUsage(argv[0], custom_opts);
507 return false;
508 break;
509 }
510 }
Jagger72f258b2015-10-09 23:09:01 +0200511
Robert Swieckia88f96f2015-10-09 16:47:39 +0200512 if (logInitLogFile(logfile, ll) == false) {
513 return false;
514 }
515
516 hfuzz->cmdline = &argv[optind];
517 if (hfuzz->cmdline[0] == NULL) {
518 LOG_E("No fuzz command provided");
519 cmdlineUsage(argv[0], custom_opts);
520 return false;
521 }
522
Robert Swiecki0f937af2016-03-30 18:19:16 +0200523 if (!hfuzz->fuzzStdin && !hfuzz->persistent && !checkFor_FILE_PLACEHOLDER(hfuzz->cmdline)) {
Robert Swieckia88f96f2015-10-09 16:47:39 +0200524 LOG_E("You must specify '" _HF_FILE_PLACEHOLDER
Robert Swiecki0f937af2016-03-30 18:19:16 +0200525 "' when the -s (stdin fuzzing) or --persistent options are not set");
Robert Swieckia88f96f2015-10-09 16:47:39 +0200526 return false;
527 }
528
Robert Swiecki5b775b22017-04-28 16:19:15 +0200529 if (hfuzz->fuzzStdin && hfuzz->persistent) {
Robert Swieckid633fe02017-04-28 17:40:27 +0200530 LOG_E
531 ("Stdin fuzzing (-s) and persistent fuzzing (-P) cannot be specified at the same time");
532 return false;
Robert Swiecki5b775b22017-04-28 16:19:15 +0200533 }
534
Robert Swiecki71b73722016-09-05 15:18:25 +0200535 if (hfuzz->threadsMax >= _HF_THREAD_MAX) {
536 LOG_E("Too many fuzzing threads specified %zu (>= _HF_THREAD_MAX (%u))", hfuzz->threadsMax,
537 _HF_THREAD_MAX);
538 return false;
539 }
540
Robert Swieckia88f96f2015-10-09 16:47:39 +0200541 if (strchr(hfuzz->fileExtn, '/')) {
542 LOG_E("The file extension contains the '/' character: '%s'", hfuzz->fileExtn);
543 return false;
544 }
Anestis Bechtsoudisbe0ac7b2015-12-26 15:38:47 +0200545
Anestis Bechtsoudis8f4aa612015-12-27 12:06:19 +0200546 if (hfuzz->workDir[0] != '.' || strlen(hfuzz->workDir) > 2) {
Anestis Bechtsoudisc8e7f6e2015-12-26 14:48:48 +0200547 if (!files_exists(hfuzz->workDir)) {
548 LOG_E("Provided workspace directory '%s' doesn't exist", hfuzz->workDir);
549 return false;
550 }
551 }
Robert Swieckia88f96f2015-10-09 16:47:39 +0200552
Jagger247c3b42016-03-21 23:24:05 +0100553 if (hfuzz->linux.pid > 0 || hfuzz->linux.pidFile) {
554 LOG_I("PID=%d specified, lowering maximum number of concurrent threads to 1",
555 hfuzz->linux.pid);
Robert Swieckia88f96f2015-10-09 16:47:39 +0200556 hfuzz->threadsMax = 1;
557 }
558
Robert Swieckia96d78d2016-03-14 16:50:50 +0100559 if (hfuzz->origFlipRate == 0.0L && hfuzz->useVerifier) {
Anestis Bechtsoudisc8e7f6e2015-12-26 14:48:48 +0200560 LOG_I("Verifier enabled with 0.0 flipRate, activating dry run mode");
Anestis Bechtsoudis46ea10e2015-11-07 18:16:25 +0200561 }
562
Anestis Bechtsoudisc1a0d9f2016-12-29 11:34:10 +0200563 /*
564 * 'enableSanitizers' can be auto enabled when 'useSanCov', although it's probably
565 * better to let user know about the features that each flag control.
566 */
567 if (hfuzz->useSanCov == true && hfuzz->enableSanitizers == false) {
568 LOG_E("Sanitizer coverage cannot be used without enabling sanitizers '-S/--sanitizers'");
569 return false;
570 }
571
Robert Swieckiaa87aae2017-02-09 03:04:51 +0100572 LOG_I("PID: %d, inputDir '%s', nullifyStdio: %s, fuzzStdin: %s, saveUnique: %s, flipRate: %lf, "
Anestis Bechtsoudisecab7762016-12-27 18:27:30 +0200573 "externalCommand: '%s', tmOut: %ld, mutationsMax: %zu, threadsMax: %zu, fileExtn: '%s', "
574 "memoryLimit: 0x%" PRIx64 "(MiB), fuzzExe: '%s', fuzzedPid: %d, monitorSIGABRT: '%s'",
Robert Swieckiaa87aae2017-02-09 03:04:51 +0100575 (int)getpid(), hfuzz->inputDir,
Robert Swieckia88f96f2015-10-09 16:47:39 +0200576 cmdlineYesNo(hfuzz->nullifyStdio), cmdlineYesNo(hfuzz->fuzzStdin),
Robert Swieckia96d78d2016-03-14 16:50:50 +0100577 cmdlineYesNo(hfuzz->saveUnique), hfuzz->origFlipRate,
Robert Swieckia88f96f2015-10-09 16:47:39 +0200578 hfuzz->externalCommand == NULL ? "NULL" : hfuzz->externalCommand, hfuzz->tmOut,
Jagger247c3b42016-03-21 23:24:05 +0100579 hfuzz->mutationsMax, hfuzz->threadsMax, hfuzz->fileExtn,
Anestis Bechtsoudisac366a12016-12-28 12:38:44 +0200580 hfuzz->asLimit, hfuzz->cmdline[0], hfuzz->linux.pid, cmdlineYesNo(hfuzz->monitorSIGABRT));
Robert Swieckia88f96f2015-10-09 16:47:39 +0200581
Robert Swiecki2aaa52b2016-01-19 14:40:47 +0100582 snprintf(hfuzz->cmdline_txt, sizeof(hfuzz->cmdline_txt), "%s", hfuzz->cmdline[0]);
Robert Swiecki72d2bef2016-01-19 14:39:26 +0100583 for (size_t i = 1; hfuzz->cmdline[i]; i++) {
584 util_ssnprintf(hfuzz->cmdline_txt, sizeof(hfuzz->cmdline_txt), " %s", hfuzz->cmdline[i]);
Robert Swieckif2d9c3a2016-11-03 02:13:54 +0100585 if (strlen(hfuzz->cmdline_txt) == (sizeof(hfuzz->cmdline_txt) - 1)) {
586 hfuzz->cmdline_txt[sizeof(hfuzz->cmdline_txt) - 3] = '.';
587 hfuzz->cmdline_txt[sizeof(hfuzz->cmdline_txt) - 2] = '.';
588 hfuzz->cmdline_txt[sizeof(hfuzz->cmdline_txt) - 1] = '.';
589 }
Robert Swiecki72d2bef2016-01-19 14:39:26 +0100590 }
591
Robert Swieckia88f96f2015-10-09 16:47:39 +0200592 return true;
593}