2016-04-21 16:13:22 +02:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2016 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/ptrace.h>
|
|
|
|
|
|
|
|
#include <elf.h>
|
2017-03-30 00:01:15 +02:00
|
|
|
#include <err.h>
|
2017-02-16 23:12:41 +01:00
|
|
|
#include <fcntl.h>
|
2016-04-21 16:13:22 +02:00
|
|
|
#include <sched.h>
|
|
|
|
#include <sys/prctl.h>
|
2017-02-16 23:12:41 +01:00
|
|
|
#include <sys/ptrace.h>
|
2016-04-21 16:13:22 +02:00
|
|
|
#include <sys/uio.h>
|
|
|
|
#include <sys/user.h>
|
2017-02-16 23:12:41 +01:00
|
|
|
#include <sys/wait.h>
|
2016-04-21 16:13:22 +02:00
|
|
|
#include <unistd.h>
|
|
|
|
|
2017-03-30 00:01:15 +02:00
|
|
|
#include <chrono>
|
|
|
|
#include <thread>
|
|
|
|
|
2016-04-21 16:13:22 +02:00
|
|
|
#include <gtest/gtest.h>
|
|
|
|
|
2017-02-22 19:22:46 +01:00
|
|
|
#include <android-base/macros.h>
|
2017-02-16 23:12:41 +01:00
|
|
|
#include <android-base/unique_fd.h>
|
|
|
|
|
2019-02-06 03:43:34 +01:00
|
|
|
#include "utils.h"
|
|
|
|
|
2017-03-30 00:01:15 +02:00
|
|
|
using namespace std::chrono_literals;
|
|
|
|
|
2017-02-16 23:12:41 +01:00
|
|
|
using android::base::unique_fd;
|
|
|
|
|
2016-04-21 16:13:22 +02:00
|
|
|
// Host libc does not define this.
|
|
|
|
#ifndef TRAP_HWBKPT
|
|
|
|
#define TRAP_HWBKPT 4
|
|
|
|
#endif
|
|
|
|
|
|
|
|
class ChildGuard {
|
|
|
|
public:
|
2016-05-03 21:08:05 +02:00
|
|
|
explicit ChildGuard(pid_t pid) : pid(pid) {}
|
2016-04-21 16:13:22 +02:00
|
|
|
|
|
|
|
~ChildGuard() {
|
|
|
|
kill(pid, SIGKILL);
|
|
|
|
int status;
|
2017-11-28 21:55:19 +01:00
|
|
|
TEMP_FAILURE_RETRY(waitpid(pid, &status, 0));
|
2016-04-21 16:13:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
pid_t pid;
|
|
|
|
};
|
|
|
|
|
2017-01-23 16:41:35 +01:00
|
|
|
enum class HwFeature { Watchpoint, Breakpoint };
|
|
|
|
|
2019-03-09 00:20:23 +01:00
|
|
|
static void check_hw_feature_supported(pid_t child, HwFeature feature) {
|
2016-04-21 16:13:22 +02:00
|
|
|
#if defined(__arm__)
|
2023-09-21 23:11:19 +02:00
|
|
|
errno = 0;
|
2016-04-21 16:13:22 +02:00
|
|
|
long capabilities;
|
|
|
|
long result = ptrace(PTRACE_GETHBPREGS, child, 0, &capabilities);
|
|
|
|
if (result == -1) {
|
2023-09-21 23:11:19 +02:00
|
|
|
EXPECT_ERRNO(EIO);
|
2019-03-09 00:20:23 +01:00
|
|
|
GTEST_SKIP() << "Hardware debug support disabled at kernel configuration time";
|
2016-04-21 16:13:22 +02:00
|
|
|
}
|
2017-07-07 12:42:34 +02:00
|
|
|
uint8_t hb_count = capabilities & 0xff;
|
|
|
|
capabilities >>= 8;
|
|
|
|
uint8_t wp_count = capabilities & 0xff;
|
|
|
|
capabilities >>= 8;
|
|
|
|
uint8_t max_wp_size = capabilities & 0xff;
|
|
|
|
if (max_wp_size == 0) {
|
2019-03-09 00:20:23 +01:00
|
|
|
GTEST_SKIP() << "Kernel reports zero maximum watchpoint size";
|
|
|
|
} else if (feature == HwFeature::Watchpoint && wp_count == 0) {
|
|
|
|
GTEST_SKIP() << "Kernel reports zero hardware watchpoints";
|
|
|
|
} else if (feature == HwFeature::Breakpoint && hb_count == 0) {
|
|
|
|
GTEST_SKIP() << "Kernel reports zero hardware breakpoints";
|
2017-07-07 12:42:34 +02:00
|
|
|
}
|
2016-04-21 16:13:22 +02:00
|
|
|
#elif defined(__aarch64__)
|
|
|
|
user_hwdebug_state dreg_state;
|
|
|
|
iovec iov;
|
|
|
|
iov.iov_base = &dreg_state;
|
|
|
|
iov.iov_len = sizeof(dreg_state);
|
|
|
|
|
2023-09-21 23:11:19 +02:00
|
|
|
errno = 0;
|
2017-01-23 16:41:35 +01:00
|
|
|
long result = ptrace(PTRACE_GETREGSET, child,
|
|
|
|
feature == HwFeature::Watchpoint ? NT_ARM_HW_WATCH : NT_ARM_HW_BREAK, &iov);
|
2016-04-21 16:13:22 +02:00
|
|
|
if (result == -1) {
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(EINVAL);
|
2019-12-11 15:30:16 +01:00
|
|
|
GTEST_SKIP() << "Hardware support missing";
|
|
|
|
} else if ((dreg_state.dbg_info & 0xff) == 0) {
|
|
|
|
if (feature == HwFeature::Watchpoint) {
|
|
|
|
GTEST_SKIP() << "Kernel reports zero hardware watchpoints";
|
|
|
|
} else {
|
|
|
|
GTEST_SKIP() << "Kernel reports zero hardware breakpoints";
|
|
|
|
}
|
2016-04-21 16:13:22 +02:00
|
|
|
}
|
|
|
|
#else
|
2019-03-09 00:20:23 +01:00
|
|
|
// We assume watchpoints and breakpoints are always supported on x86.
|
2017-02-22 19:22:46 +01:00
|
|
|
UNUSED(child);
|
|
|
|
UNUSED(feature);
|
2016-04-21 16:13:22 +02:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2017-02-22 19:22:46 +01:00
|
|
|
static void set_watchpoint(pid_t child, uintptr_t address, size_t size) {
|
|
|
|
ASSERT_EQ(0u, address & 0x7) << "address: " << address;
|
2016-04-21 16:13:22 +02:00
|
|
|
#if defined(__arm__) || defined(__aarch64__)
|
|
|
|
const unsigned byte_mask = (1 << size) - 1;
|
|
|
|
const unsigned type = 2; // Write.
|
|
|
|
const unsigned enable = 1;
|
|
|
|
const unsigned control = byte_mask << 5 | type << 3 | enable;
|
|
|
|
|
|
|
|
#ifdef __arm__
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, -1, &address)) << strerror(errno);
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, -2, &control)) << strerror(errno);
|
|
|
|
#else // aarch64
|
|
|
|
user_hwdebug_state dreg_state;
|
|
|
|
memset(&dreg_state, 0, sizeof dreg_state);
|
2017-02-22 19:22:46 +01:00
|
|
|
dreg_state.dbg_regs[0].addr = address;
|
2016-04-21 16:13:22 +02:00
|
|
|
dreg_state.dbg_regs[0].ctrl = control;
|
|
|
|
|
|
|
|
iovec iov;
|
|
|
|
iov.iov_base = &dreg_state;
|
|
|
|
iov.iov_len = offsetof(user_hwdebug_state, dbg_regs) + sizeof(dreg_state.dbg_regs[0]);
|
|
|
|
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_SETREGSET, child, NT_ARM_HW_WATCH, &iov)) << strerror(errno);
|
|
|
|
#endif
|
|
|
|
#elif defined(__i386__) || defined(__x86_64__)
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[0]), address)) << strerror(errno);
|
|
|
|
errno = 0;
|
|
|
|
unsigned data = ptrace(PTRACE_PEEKUSER, child, offsetof(user, u_debugreg[7]), nullptr);
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(0);
|
2016-04-21 16:13:22 +02:00
|
|
|
|
|
|
|
const unsigned size_flag = (size == 8) ? 2 : size - 1;
|
|
|
|
const unsigned enable = 1;
|
|
|
|
const unsigned type = 1; // Write.
|
|
|
|
|
|
|
|
const unsigned mask = 3 << 18 | 3 << 16 | 1;
|
|
|
|
const unsigned value = size_flag << 18 | type << 16 | enable;
|
|
|
|
data &= mask;
|
|
|
|
data |= value;
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[7]), data)) << strerror(errno);
|
|
|
|
#else
|
2017-02-22 19:22:46 +01:00
|
|
|
UNUSED(child);
|
|
|
|
UNUSED(address);
|
|
|
|
UNUSED(size);
|
2016-04-21 16:13:22 +02:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2017-02-22 19:22:46 +01:00
|
|
|
template <typename T>
|
|
|
|
static void run_watchpoint_test(std::function<void(T&)> child_func, size_t offset, size_t size) {
|
|
|
|
alignas(16) T data{};
|
2016-04-21 16:13:22 +02:00
|
|
|
|
|
|
|
pid_t child = fork();
|
|
|
|
ASSERT_NE(-1, child) << strerror(errno);
|
2017-02-22 19:22:46 +01:00
|
|
|
if (child == 0) {
|
|
|
|
// Extra precaution: make sure we go away if anything happens to our parent.
|
|
|
|
if (prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0) == -1) {
|
|
|
|
perror("prctl(PR_SET_PDEATHSIG)");
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ptrace(PTRACE_TRACEME, 0, nullptr, nullptr) == -1) {
|
|
|
|
perror("ptrace(PTRACE_TRACEME)");
|
|
|
|
_exit(2);
|
|
|
|
}
|
|
|
|
|
|
|
|
child_func(data);
|
|
|
|
_exit(0);
|
|
|
|
}
|
2016-04-21 16:13:22 +02:00
|
|
|
|
|
|
|
ChildGuard guard(child);
|
|
|
|
|
|
|
|
int status;
|
2017-11-28 21:55:19 +01:00
|
|
|
ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
|
2016-04-21 16:13:22 +02:00
|
|
|
ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
|
|
|
|
ASSERT_EQ(SIGSTOP, WSTOPSIG(status)) << "Status was: " << status;
|
|
|
|
|
2019-03-09 00:20:23 +01:00
|
|
|
check_hw_feature_supported(child, HwFeature::Watchpoint);
|
2019-09-23 18:03:10 +02:00
|
|
|
if (::testing::Test::IsSkipped()) {
|
|
|
|
return;
|
|
|
|
}
|
2016-04-21 16:13:22 +02:00
|
|
|
|
2019-02-06 03:43:34 +01:00
|
|
|
set_watchpoint(child, uintptr_t(untag_address(&data)) + offset, size);
|
2016-04-21 16:13:22 +02:00
|
|
|
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_CONT, child, nullptr, nullptr)) << strerror(errno);
|
2017-11-28 21:55:19 +01:00
|
|
|
ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
|
2016-04-21 16:13:22 +02:00
|
|
|
ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
|
|
|
|
ASSERT_EQ(SIGTRAP, WSTOPSIG(status)) << "Status was: " << status;
|
|
|
|
|
|
|
|
siginfo_t siginfo;
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_GETSIGINFO, child, nullptr, &siginfo)) << strerror(errno);
|
|
|
|
ASSERT_EQ(TRAP_HWBKPT, siginfo.si_code);
|
|
|
|
#if defined(__arm__) || defined(__aarch64__)
|
2017-02-22 19:22:46 +01:00
|
|
|
ASSERT_LE(&data, siginfo.si_addr);
|
|
|
|
ASSERT_GT((&data) + 1, siginfo.si_addr);
|
2016-04-21 16:13:22 +02:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2017-02-22 19:22:46 +01:00
|
|
|
template <typename T>
|
|
|
|
static void watchpoint_stress_child(unsigned cpu, T& data) {
|
|
|
|
cpu_set_t cpus;
|
|
|
|
CPU_ZERO(&cpus);
|
|
|
|
CPU_SET(cpu, &cpus);
|
|
|
|
if (sched_setaffinity(0, sizeof cpus, &cpus) == -1) {
|
|
|
|
perror("sched_setaffinity");
|
|
|
|
_exit(3);
|
|
|
|
}
|
|
|
|
raise(SIGSTOP); // Synchronize with the tracer, let it set the watchpoint.
|
|
|
|
|
|
|
|
data = 1; // Now trigger the watchpoint.
|
|
|
|
}
|
|
|
|
|
|
|
|
template <typename T>
|
|
|
|
static void run_watchpoint_stress(size_t cpu) {
|
|
|
|
run_watchpoint_test<T>(std::bind(watchpoint_stress_child<T>, cpu, std::placeholders::_1), 0,
|
|
|
|
sizeof(T));
|
2016-04-21 16:13:22 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Test watchpoint API. The test is considered successful if our watchpoints get hit OR the
|
|
|
|
// system reports that watchpoint support is not present. We run the test for different
|
|
|
|
// watchpoint sizes, while pinning the process to each cpu in turn, for better coverage.
|
2017-01-23 16:41:35 +01:00
|
|
|
TEST(sys_ptrace, watchpoint_stress) {
|
2016-04-21 16:13:22 +02:00
|
|
|
cpu_set_t available_cpus;
|
|
|
|
ASSERT_EQ(0, sched_getaffinity(0, sizeof available_cpus, &available_cpus));
|
|
|
|
|
|
|
|
for (size_t cpu = 0; cpu < CPU_SETSIZE; ++cpu) {
|
|
|
|
if (!CPU_ISSET(cpu, &available_cpus)) continue;
|
2017-02-22 19:22:46 +01:00
|
|
|
|
|
|
|
run_watchpoint_stress<uint8_t>(cpu);
|
2019-09-23 18:03:10 +02:00
|
|
|
if (::testing::Test::IsSkipped()) {
|
|
|
|
// Only check first case, since all others would skip for same reason.
|
|
|
|
return;
|
|
|
|
}
|
2017-02-22 19:22:46 +01:00
|
|
|
run_watchpoint_stress<uint16_t>(cpu);
|
|
|
|
run_watchpoint_stress<uint32_t>(cpu);
|
|
|
|
#if defined(__LP64__)
|
|
|
|
run_watchpoint_stress<uint64_t>(cpu);
|
|
|
|
#endif
|
2016-04-21 16:13:22 +02:00
|
|
|
}
|
|
|
|
}
|
2017-01-23 16:41:35 +01:00
|
|
|
|
2017-02-22 19:22:46 +01:00
|
|
|
struct Uint128_t {
|
|
|
|
uint64_t data[2];
|
|
|
|
};
|
|
|
|
static void watchpoint_imprecise_child(Uint128_t& data) {
|
|
|
|
raise(SIGSTOP); // Synchronize with the tracer, let it set the watchpoint.
|
|
|
|
|
|
|
|
#if defined(__i386__) || defined(__x86_64__)
|
|
|
|
asm volatile("movdqa %%xmm0, %0" : : "m"(data));
|
|
|
|
#elif defined(__arm__)
|
|
|
|
asm volatile("stm %0, { r0, r1, r2, r3 }" : : "r"(&data));
|
|
|
|
#elif defined(__aarch64__)
|
|
|
|
asm volatile("stp x0, x1, %0" : : "m"(data));
|
2022-11-11 23:54:02 +01:00
|
|
|
#elif defined(__riscv)
|
|
|
|
UNUSED(data);
|
|
|
|
GTEST_LOG_(INFO) << "missing riscv64 instruction to store > 64 bits in one instruction";
|
2017-02-22 19:22:46 +01:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that the kernel is able to handle the case when the instruction writes
|
|
|
|
// to a larger block of memory than the one we are watching. If you see this
|
|
|
|
// test fail on arm64, you will likely need to cherry-pick fdfeff0f into your
|
|
|
|
// kernel.
|
|
|
|
TEST(sys_ptrace, watchpoint_imprecise) {
|
2017-11-29 19:34:24 +01:00
|
|
|
// This test relies on the infrastructure to timeout if the test hangs.
|
2017-04-26 12:30:06 +02:00
|
|
|
run_watchpoint_test<Uint128_t>(watchpoint_imprecise_child, 8, sizeof(void*));
|
2017-02-22 19:22:46 +01:00
|
|
|
}
|
|
|
|
|
2017-01-23 16:41:35 +01:00
|
|
|
static void __attribute__((noinline)) breakpoint_func() {
|
|
|
|
asm volatile("");
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __attribute__((noreturn)) breakpoint_fork_child() {
|
|
|
|
// Extra precaution: make sure we go away if anything happens to our parent.
|
|
|
|
if (prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0) == -1) {
|
|
|
|
perror("prctl(PR_SET_PDEATHSIG)");
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ptrace(PTRACE_TRACEME, 0, nullptr, nullptr) == -1) {
|
|
|
|
perror("ptrace(PTRACE_TRACEME)");
|
|
|
|
_exit(2);
|
|
|
|
}
|
|
|
|
|
|
|
|
raise(SIGSTOP); // Synchronize with the tracer, let it set the breakpoint.
|
|
|
|
|
|
|
|
breakpoint_func(); // Now trigger the breakpoint.
|
|
|
|
|
|
|
|
_exit(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void set_breakpoint(pid_t child) {
|
|
|
|
uintptr_t address = uintptr_t(breakpoint_func);
|
|
|
|
#if defined(__arm__) || defined(__aarch64__)
|
|
|
|
address &= ~3;
|
|
|
|
const unsigned byte_mask = 0xf;
|
|
|
|
const unsigned enable = 1;
|
|
|
|
const unsigned control = byte_mask << 5 | enable;
|
|
|
|
|
|
|
|
#ifdef __arm__
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, 1, &address)) << strerror(errno);
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_SETHBPREGS, child, 2, &control)) << strerror(errno);
|
|
|
|
#else // aarch64
|
|
|
|
user_hwdebug_state dreg_state;
|
|
|
|
memset(&dreg_state, 0, sizeof dreg_state);
|
|
|
|
dreg_state.dbg_regs[0].addr = reinterpret_cast<uintptr_t>(address);
|
|
|
|
dreg_state.dbg_regs[0].ctrl = control;
|
|
|
|
|
|
|
|
iovec iov;
|
|
|
|
iov.iov_base = &dreg_state;
|
|
|
|
iov.iov_len = offsetof(user_hwdebug_state, dbg_regs) + sizeof(dreg_state.dbg_regs[0]);
|
|
|
|
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_SETREGSET, child, NT_ARM_HW_BREAK, &iov)) << strerror(errno);
|
|
|
|
#endif
|
|
|
|
#elif defined(__i386__) || defined(__x86_64__)
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[0]), address))
|
|
|
|
<< strerror(errno);
|
|
|
|
errno = 0;
|
|
|
|
unsigned data = ptrace(PTRACE_PEEKUSER, child, offsetof(user, u_debugreg[7]), nullptr);
|
2023-09-21 23:11:19 +02:00
|
|
|
ASSERT_ERRNO(0);
|
2017-01-23 16:41:35 +01:00
|
|
|
|
|
|
|
const unsigned size = 0;
|
|
|
|
const unsigned enable = 1;
|
|
|
|
const unsigned type = 0; // Execute
|
|
|
|
|
|
|
|
const unsigned mask = 3 << 18 | 3 << 16 | 1;
|
|
|
|
const unsigned value = size << 18 | type << 16 | enable;
|
|
|
|
data &= mask;
|
|
|
|
data |= value;
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_POKEUSER, child, offsetof(user, u_debugreg[7]), data))
|
|
|
|
<< strerror(errno);
|
|
|
|
#else
|
2017-02-22 19:22:46 +01:00
|
|
|
UNUSED(child);
|
|
|
|
UNUSED(address);
|
2017-01-23 16:41:35 +01:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test hardware breakpoint API. The test is considered successful if the breakpoints get hit OR the
|
|
|
|
// system reports that hardware breakpoint support is not present.
|
|
|
|
TEST(sys_ptrace, hardware_breakpoint) {
|
|
|
|
pid_t child = fork();
|
|
|
|
ASSERT_NE(-1, child) << strerror(errno);
|
|
|
|
if (child == 0) breakpoint_fork_child();
|
|
|
|
|
|
|
|
ChildGuard guard(child);
|
|
|
|
|
|
|
|
int status;
|
2017-11-28 21:55:19 +01:00
|
|
|
ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
|
2017-01-23 16:41:35 +01:00
|
|
|
ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
|
|
|
|
ASSERT_EQ(SIGSTOP, WSTOPSIG(status)) << "Status was: " << status;
|
|
|
|
|
2019-03-09 00:20:23 +01:00
|
|
|
check_hw_feature_supported(child, HwFeature::Breakpoint);
|
2019-09-23 18:03:10 +02:00
|
|
|
if (::testing::Test::IsSkipped()) {
|
|
|
|
return;
|
|
|
|
}
|
2017-01-23 16:41:35 +01:00
|
|
|
|
|
|
|
set_breakpoint(child);
|
|
|
|
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_CONT, child, nullptr, nullptr)) << strerror(errno);
|
2017-11-28 21:55:19 +01:00
|
|
|
ASSERT_EQ(child, TEMP_FAILURE_RETRY(waitpid(child, &status, __WALL))) << strerror(errno);
|
2017-01-23 16:41:35 +01:00
|
|
|
ASSERT_TRUE(WIFSTOPPED(status)) << "Status was: " << status;
|
|
|
|
ASSERT_EQ(SIGTRAP, WSTOPSIG(status)) << "Status was: " << status;
|
|
|
|
|
|
|
|
siginfo_t siginfo;
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_GETSIGINFO, child, nullptr, &siginfo)) << strerror(errno);
|
|
|
|
ASSERT_EQ(TRAP_HWBKPT, siginfo.si_code);
|
|
|
|
}
|
2017-02-16 23:12:41 +01:00
|
|
|
|
|
|
|
class PtraceResumptionTest : public ::testing::Test {
|
|
|
|
public:
|
2017-03-30 00:01:15 +02:00
|
|
|
unique_fd worker_pipe_write;
|
2017-02-16 23:12:41 +01:00
|
|
|
|
2017-03-30 00:01:15 +02:00
|
|
|
pid_t worker = -1;
|
|
|
|
pid_t tracer = -1;
|
2017-02-16 23:12:41 +01:00
|
|
|
|
2017-03-30 00:01:15 +02:00
|
|
|
PtraceResumptionTest() {
|
|
|
|
unique_fd worker_pipe_read;
|
2018-04-04 19:13:25 +02:00
|
|
|
if (!android::base::Pipe(&worker_pipe_read, &worker_pipe_write)) {
|
2017-03-30 00:01:15 +02:00
|
|
|
err(1, "failed to create pipe");
|
|
|
|
}
|
|
|
|
|
2018-04-04 19:13:25 +02:00
|
|
|
// Second pipe to synchronize the Yama ptracer setup.
|
|
|
|
unique_fd worker_pipe_setup_read, worker_pipe_setup_write;
|
|
|
|
if (!android::base::Pipe(&worker_pipe_setup_read, &worker_pipe_setup_write)) {
|
|
|
|
err(1, "failed to create pipe");
|
|
|
|
}
|
2017-02-16 23:12:41 +01:00
|
|
|
|
|
|
|
worker = fork();
|
2017-03-30 00:01:15 +02:00
|
|
|
if (worker == -1) {
|
|
|
|
err(1, "failed to fork worker");
|
|
|
|
} else if (worker == 0) {
|
2017-02-16 23:12:41 +01:00
|
|
|
char buf;
|
2018-04-04 19:13:25 +02:00
|
|
|
// Allow the tracer process, which is not a direct process ancestor, to
|
|
|
|
// be able to use ptrace(2) on this process when Yama LSM is active.
|
|
|
|
if (prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, 0, 0, 0) == -1) {
|
|
|
|
// if Yama is off prctl(PR_SET_PTRACER) returns EINVAL - don't log in this
|
|
|
|
// case since it's expected behaviour.
|
|
|
|
if (errno != EINVAL) {
|
|
|
|
err(1, "prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY) failed for pid %d", getpid());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
worker_pipe_setup_write.reset();
|
|
|
|
|
2017-02-16 23:12:41 +01:00
|
|
|
worker_pipe_write.reset();
|
|
|
|
TEMP_FAILURE_RETRY(read(worker_pipe_read.get(), &buf, sizeof(buf)));
|
|
|
|
exit(0);
|
2018-04-04 19:13:25 +02:00
|
|
|
} else {
|
|
|
|
// Wait until the Yama ptracer is setup.
|
|
|
|
char buf;
|
|
|
|
worker_pipe_setup_write.reset();
|
|
|
|
TEMP_FAILURE_RETRY(read(worker_pipe_setup_read.get(), &buf, sizeof(buf)));
|
2017-02-16 23:12:41 +01:00
|
|
|
}
|
2017-03-30 00:01:15 +02:00
|
|
|
}
|
|
|
|
|
2019-03-29 22:25:16 +01:00
|
|
|
~PtraceResumptionTest() override {
|
2017-03-30 00:01:15 +02:00
|
|
|
}
|
2017-02-16 23:12:41 +01:00
|
|
|
|
2017-03-30 00:01:15 +02:00
|
|
|
void AssertDeath(int signo);
|
|
|
|
|
|
|
|
void StartTracer(std::function<void()> f) {
|
|
|
|
tracer = fork();
|
2017-02-16 23:12:41 +01:00
|
|
|
ASSERT_NE(-1, tracer);
|
|
|
|
if (tracer == 0) {
|
|
|
|
f();
|
|
|
|
if (HasFatalFailure()) {
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
exit(0);
|
|
|
|
}
|
2017-03-30 00:01:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
bool WaitForTracer() {
|
|
|
|
if (tracer == -1) {
|
|
|
|
errx(1, "tracer not started");
|
|
|
|
}
|
2017-02-16 23:12:41 +01:00
|
|
|
|
|
|
|
int result;
|
2017-11-28 21:55:19 +01:00
|
|
|
pid_t rc = TEMP_FAILURE_RETRY(waitpid(tracer, &result, 0));
|
2017-03-30 00:01:15 +02:00
|
|
|
if (rc != tracer) {
|
|
|
|
printf("waitpid returned %d (%s)\n", rc, strerror(errno));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!WIFEXITED(result) && !WIFSIGNALED(result)) {
|
|
|
|
printf("!WIFEXITED && !WIFSIGNALED\n");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2017-02-16 23:12:41 +01:00
|
|
|
if (WIFEXITED(result)) {
|
|
|
|
if (WEXITSTATUS(result) != 0) {
|
2017-03-30 00:01:15 +02:00
|
|
|
printf("tracer failed\n");
|
|
|
|
return false;
|
2017-02-16 23:12:41 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-30 00:01:15 +02:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WaitForWorker() {
|
|
|
|
if (worker == -1) {
|
|
|
|
errx(1, "worker not started");
|
|
|
|
}
|
|
|
|
|
|
|
|
int result;
|
2017-11-28 21:55:19 +01:00
|
|
|
pid_t rc = TEMP_FAILURE_RETRY(waitpid(worker, &result, WNOHANG));
|
2017-03-30 00:01:15 +02:00
|
|
|
if (rc != 0) {
|
|
|
|
printf("worker exited prematurely\n");
|
|
|
|
return false;
|
|
|
|
}
|
2017-02-16 23:12:41 +01:00
|
|
|
|
|
|
|
worker_pipe_write.reset();
|
|
|
|
|
2017-11-28 21:55:19 +01:00
|
|
|
rc = TEMP_FAILURE_RETRY(waitpid(worker, &result, 0));
|
2017-03-30 00:01:15 +02:00
|
|
|
if (rc != worker) {
|
|
|
|
printf("waitpid for worker returned %d (%s)\n", rc, strerror(errno));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!WIFEXITED(result)) {
|
|
|
|
printf("worker didn't exit\n");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (WEXITSTATUS(result) != 0) {
|
|
|
|
printf("worker exited with status %d\n", WEXITSTATUS(result));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
2017-02-16 23:12:41 +01:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
static void wait_for_ptrace_stop(pid_t pid) {
|
|
|
|
while (true) {
|
|
|
|
int status;
|
|
|
|
pid_t rc = TEMP_FAILURE_RETRY(waitpid(pid, &status, __WALL));
|
|
|
|
if (rc != pid) {
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
if (WIFSTOPPED(status)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-30 00:01:15 +02:00
|
|
|
TEST_F(PtraceResumptionTest, smoke) {
|
|
|
|
// Make sure that the worker doesn't exit before the tracer stops tracing.
|
|
|
|
StartTracer([this]() {
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
|
|
|
|
wait_for_ptrace_stop(worker);
|
|
|
|
std::this_thread::sleep_for(500ms);
|
|
|
|
});
|
|
|
|
|
|
|
|
worker_pipe_write.reset();
|
|
|
|
std::this_thread::sleep_for(250ms);
|
|
|
|
|
|
|
|
int result;
|
2017-11-28 21:55:19 +01:00
|
|
|
ASSERT_EQ(0, TEMP_FAILURE_RETRY(waitpid(worker, &result, WNOHANG)));
|
2017-03-30 00:01:15 +02:00
|
|
|
ASSERT_TRUE(WaitForTracer());
|
2017-11-28 21:55:19 +01:00
|
|
|
ASSERT_EQ(worker, TEMP_FAILURE_RETRY(waitpid(worker, &result, 0)));
|
2017-03-30 00:01:15 +02:00
|
|
|
}
|
|
|
|
|
2017-02-16 23:12:41 +01:00
|
|
|
TEST_F(PtraceResumptionTest, seize) {
|
2017-03-30 00:01:15 +02:00
|
|
|
StartTracer([this]() { ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno); });
|
|
|
|
ASSERT_TRUE(WaitForTracer());
|
|
|
|
ASSERT_TRUE(WaitForWorker());
|
2017-02-16 23:12:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(PtraceResumptionTest, seize_interrupt) {
|
2017-03-30 00:01:15 +02:00
|
|
|
StartTracer([this]() {
|
2017-02-16 23:12:41 +01:00
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
|
2017-03-30 00:01:15 +02:00
|
|
|
wait_for_ptrace_stop(worker);
|
2017-02-16 23:12:41 +01:00
|
|
|
});
|
2017-03-30 00:01:15 +02:00
|
|
|
ASSERT_TRUE(WaitForTracer());
|
|
|
|
ASSERT_TRUE(WaitForWorker());
|
2017-02-16 23:12:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(PtraceResumptionTest, seize_interrupt_cont) {
|
2017-03-30 00:01:15 +02:00
|
|
|
StartTracer([this]() {
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
|
|
|
|
wait_for_ptrace_stop(worker);
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_CONT, worker, 0, 0)) << strerror(errno);
|
|
|
|
});
|
|
|
|
ASSERT_TRUE(WaitForTracer());
|
|
|
|
ASSERT_TRUE(WaitForWorker());
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(PtraceResumptionTest, zombie_seize) {
|
|
|
|
StartTracer([this]() { ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno); });
|
|
|
|
ASSERT_TRUE(WaitForWorker());
|
|
|
|
ASSERT_TRUE(WaitForTracer());
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(PtraceResumptionTest, zombie_seize_interrupt) {
|
|
|
|
StartTracer([this]() {
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
|
|
|
|
wait_for_ptrace_stop(worker);
|
|
|
|
});
|
|
|
|
ASSERT_TRUE(WaitForWorker());
|
|
|
|
ASSERT_TRUE(WaitForTracer());
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(PtraceResumptionTest, zombie_seize_interrupt_cont) {
|
|
|
|
StartTracer([this]() {
|
2017-02-16 23:12:41 +01:00
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_SEIZE, worker, 0, 0)) << strerror(errno);
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_INTERRUPT, worker, 0, 0)) << strerror(errno);
|
|
|
|
wait_for_ptrace_stop(worker);
|
|
|
|
ASSERT_EQ(0, ptrace(PTRACE_CONT, worker, 0, 0)) << strerror(errno);
|
|
|
|
});
|
2017-03-30 00:01:15 +02:00
|
|
|
ASSERT_TRUE(WaitForWorker());
|
|
|
|
ASSERT_TRUE(WaitForTracer());
|
2017-02-16 23:12:41 +01:00
|
|
|
}
|