1 1.1 kamil /* $NetBSD: t_ptrace_exec_wait.h,v 1.1 2020/05/05 00:23:12 kamil Exp $ */ 2 1.1 kamil 3 1.1 kamil /*- 4 1.1 kamil * Copyright (c) 2016, 2017, 2018, 2019, 2020 The NetBSD Foundation, Inc. 5 1.1 kamil * All rights reserved. 6 1.1 kamil * 7 1.1 kamil * Redistribution and use in source and binary forms, with or without 8 1.1 kamil * modification, are permitted provided that the following conditions 9 1.1 kamil * are met: 10 1.1 kamil * 1. Redistributions of source code must retain the above copyright 11 1.1 kamil * notice, this list of conditions and the following disclaimer. 12 1.1 kamil * 2. Redistributions in binary form must reproduce the above copyright 13 1.1 kamil * notice, this list of conditions and the following disclaimer in the 14 1.1 kamil * documentation and/or other materials provided with the distribution. 15 1.1 kamil * 16 1.1 kamil * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 17 1.1 kamil * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 18 1.1 kamil * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 19 1.1 kamil * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 20 1.1 kamil * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 21 1.1 kamil * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 22 1.1 kamil * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 23 1.1 kamil * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 24 1.1 kamil * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 25 1.1 kamil * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 26 1.1 kamil * POSSIBILITY OF SUCH DAMAGE. 27 1.1 kamil */ 28 1.1 kamil 29 1.1 kamil static void 30 1.1 kamil traceme_vfork_exec(bool masked, bool ignored) 31 1.1 kamil { 32 1.1 kamil const int sigval = SIGTRAP; 33 1.1 kamil pid_t child, wpid; 34 1.1 kamil #if defined(TWAIT_HAVE_STATUS) 35 1.1 kamil int status; 36 1.1 kamil #endif 37 1.1 kamil struct sigaction sa; 38 1.1 kamil struct ptrace_siginfo info; 39 1.1 kamil sigset_t intmask; 40 1.1 kamil struct kinfo_proc2 kp; 41 1.1 kamil size_t len = sizeof(kp); 42 1.1 kamil 43 1.1 kamil int name[6]; 44 1.1 kamil const size_t namelen = __arraycount(name); 45 1.1 kamil ki_sigset_t kp_sigmask; 46 1.1 kamil ki_sigset_t kp_sigignore; 47 1.1 kamil 48 1.1 kamil memset(&info, 0, sizeof(info)); 49 1.1 kamil 50 1.1 kamil DPRINTF("Before forking process PID=%d\n", getpid()); 51 1.1 kamil SYSCALL_REQUIRE((child = vfork()) != -1); 52 1.1 kamil if (child == 0) { 53 1.1 kamil DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid()); 54 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1); 55 1.1 kamil 56 1.1 kamil if (masked) { 57 1.1 kamil sigemptyset(&intmask); 58 1.1 kamil sigaddset(&intmask, sigval); 59 1.1 kamil sigprocmask(SIG_BLOCK, &intmask, NULL); 60 1.1 kamil } 61 1.1 kamil 62 1.1 kamil if (ignored) { 63 1.1 kamil memset(&sa, 0, sizeof(sa)); 64 1.1 kamil sa.sa_handler = SIG_IGN; 65 1.1 kamil sigemptyset(&sa.sa_mask); 66 1.1 kamil FORKEE_ASSERT(sigaction(sigval, &sa, NULL) != -1); 67 1.1 kamil } 68 1.1 kamil 69 1.1 kamil DPRINTF("Before calling execve(2) from child\n"); 70 1.1 kamil execlp("/bin/echo", "/bin/echo", NULL); 71 1.1 kamil 72 1.1 kamil /* NOTREACHED */ 73 1.1 kamil FORKEE_ASSERTX(0 && "Not reached"); 74 1.1 kamil } 75 1.1 kamil DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child); 76 1.1 kamil 77 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME); 78 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child); 79 1.1 kamil 80 1.1 kamil validate_status_stopped(status, sigval); 81 1.1 kamil 82 1.1 kamil name[0] = CTL_KERN, 83 1.1 kamil name[1] = KERN_PROC2, 84 1.1 kamil name[2] = KERN_PROC_PID; 85 1.1 kamil name[3] = getpid(); 86 1.1 kamil name[4] = sizeof(kp); 87 1.1 kamil name[5] = 1; 88 1.1 kamil 89 1.1 kamil ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0); 90 1.1 kamil 91 1.1 kamil if (masked) 92 1.1 kamil kp_sigmask = kp.p_sigmask; 93 1.1 kamil 94 1.1 kamil if (ignored) 95 1.1 kamil kp_sigignore = kp.p_sigignore; 96 1.1 kamil 97 1.1 kamil name[3] = getpid(); 98 1.1 kamil 99 1.1 kamil ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0); 100 1.1 kamil 101 1.1 kamil if (masked) { 102 1.1 kamil DPRINTF("kp_sigmask=" 103 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n", 104 1.1 kamil kp_sigmask.__bits[0], kp_sigmask.__bits[1], 105 1.1 kamil kp_sigmask.__bits[2], kp_sigmask.__bits[3]); 106 1.1 kamil 107 1.1 kamil DPRINTF("kp.p_sigmask=" 108 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n", 109 1.1 kamil kp.p_sigmask.__bits[0], kp.p_sigmask.__bits[1], 110 1.1 kamil kp.p_sigmask.__bits[2], kp.p_sigmask.__bits[3]); 111 1.1 kamil 112 1.1 kamil ATF_REQUIRE(!memcmp(&kp_sigmask, &kp.p_sigmask, 113 1.1 kamil sizeof(kp_sigmask))); 114 1.1 kamil } 115 1.1 kamil 116 1.1 kamil if (ignored) { 117 1.1 kamil DPRINTF("kp_sigignore=" 118 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n", 119 1.1 kamil kp_sigignore.__bits[0], kp_sigignore.__bits[1], 120 1.1 kamil kp_sigignore.__bits[2], kp_sigignore.__bits[3]); 121 1.1 kamil 122 1.1 kamil DPRINTF("kp.p_sigignore=" 123 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n", 124 1.1 kamil kp.p_sigignore.__bits[0], kp.p_sigignore.__bits[1], 125 1.1 kamil kp.p_sigignore.__bits[2], kp.p_sigignore.__bits[3]); 126 1.1 kamil 127 1.1 kamil ATF_REQUIRE(!memcmp(&kp_sigignore, &kp.p_sigignore, 128 1.1 kamil sizeof(kp_sigignore))); 129 1.1 kamil } 130 1.1 kamil 131 1.1 kamil DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n"); 132 1.1 kamil SYSCALL_REQUIRE( 133 1.1 kamil ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1); 134 1.1 kamil 135 1.1 kamil DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid); 136 1.1 kamil DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n", 137 1.1 kamil info.psi_siginfo.si_signo, info.psi_siginfo.si_code, 138 1.1 kamil info.psi_siginfo.si_errno); 139 1.1 kamil 140 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval); 141 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC); 142 1.1 kamil 143 1.1 kamil DPRINTF("Before resuming the child process where it left off and " 144 1.1 kamil "without signal to be sent\n"); 145 1.1 kamil SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1); 146 1.1 kamil 147 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME); 148 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child); 149 1.1 kamil 150 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME); 151 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0)); 152 1.1 kamil } 153 1.1 kamil 154 1.1 kamil #define TRACEME_VFORK_EXEC(test, masked, ignored) \ 155 1.1 kamil ATF_TC(test); \ 156 1.1 kamil ATF_TC_HEAD(test, tc) \ 157 1.1 kamil { \ 158 1.1 kamil atf_tc_set_md_var(tc, "descr", \ 159 1.1 kamil "Verify PT_TRACE_ME followed by exec(3) in a vfork(2)ed " \ 160 1.1 kamil "child%s%s", masked ? " with masked signal" : "", \ 161 1.1 kamil masked ? " with ignored signal" : ""); \ 162 1.1 kamil } \ 163 1.1 kamil \ 164 1.1 kamil ATF_TC_BODY(test, tc) \ 165 1.1 kamil { \ 166 1.1 kamil \ 167 1.1 kamil traceme_vfork_exec(masked, ignored); \ 168 1.1 kamil } 169 1.1 kamil 170 1.1 kamil TRACEME_VFORK_EXEC(traceme_vfork_exec, false, false) 171 1.1 kamil TRACEME_VFORK_EXEC(traceme_vfork_signalmasked_exec, true, false) 172 1.1 kamil TRACEME_VFORK_EXEC(traceme_vfork_signalignored_exec, false, true) 173 1.1 kamil 174 1.1 kamil /// ---------------------------------------------------------------------------- 175 1.1 kamil 176 1.1 kamil static void 177 1.1 kamil traceme_exec(bool masked, bool ignored) 178 1.1 kamil { 179 1.1 kamil const int sigval = SIGTRAP; 180 1.1 kamil pid_t child, wpid; 181 1.1 kamil #if defined(TWAIT_HAVE_STATUS) 182 1.1 kamil int status; 183 1.1 kamil #endif 184 1.1 kamil struct sigaction sa; 185 1.1 kamil struct ptrace_siginfo info; 186 1.1 kamil sigset_t intmask; 187 1.1 kamil struct kinfo_proc2 kp; 188 1.1 kamil size_t len = sizeof(kp); 189 1.1 kamil 190 1.1 kamil int name[6]; 191 1.1 kamil const size_t namelen = __arraycount(name); 192 1.1 kamil ki_sigset_t kp_sigmask; 193 1.1 kamil ki_sigset_t kp_sigignore; 194 1.1 kamil 195 1.1 kamil memset(&info, 0, sizeof(info)); 196 1.1 kamil 197 1.1 kamil DPRINTF("Before forking process PID=%d\n", getpid()); 198 1.1 kamil SYSCALL_REQUIRE((child = fork()) != -1); 199 1.1 kamil if (child == 0) { 200 1.1 kamil DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid()); 201 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1); 202 1.1 kamil 203 1.1 kamil if (masked) { 204 1.1 kamil sigemptyset(&intmask); 205 1.1 kamil sigaddset(&intmask, sigval); 206 1.1 kamil sigprocmask(SIG_BLOCK, &intmask, NULL); 207 1.1 kamil } 208 1.1 kamil 209 1.1 kamil if (ignored) { 210 1.1 kamil memset(&sa, 0, sizeof(sa)); 211 1.1 kamil sa.sa_handler = SIG_IGN; 212 1.1 kamil sigemptyset(&sa.sa_mask); 213 1.1 kamil FORKEE_ASSERT(sigaction(sigval, &sa, NULL) != -1); 214 1.1 kamil } 215 1.1 kamil 216 1.1 kamil DPRINTF("Before calling execve(2) from child\n"); 217 1.1 kamil execlp("/bin/echo", "/bin/echo", NULL); 218 1.1 kamil 219 1.1 kamil FORKEE_ASSERT(0 && "Not reached"); 220 1.1 kamil } 221 1.1 kamil DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child); 222 1.1 kamil 223 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME); 224 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child); 225 1.1 kamil 226 1.1 kamil validate_status_stopped(status, sigval); 227 1.1 kamil 228 1.1 kamil name[0] = CTL_KERN, 229 1.1 kamil name[1] = KERN_PROC2, 230 1.1 kamil name[2] = KERN_PROC_PID; 231 1.1 kamil name[3] = getpid(); 232 1.1 kamil name[4] = sizeof(kp); 233 1.1 kamil name[5] = 1; 234 1.1 kamil 235 1.1 kamil ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0); 236 1.1 kamil 237 1.1 kamil if (masked) 238 1.1 kamil kp_sigmask = kp.p_sigmask; 239 1.1 kamil 240 1.1 kamil if (ignored) 241 1.1 kamil kp_sigignore = kp.p_sigignore; 242 1.1 kamil 243 1.1 kamil name[3] = getpid(); 244 1.1 kamil 245 1.1 kamil ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0); 246 1.1 kamil 247 1.1 kamil if (masked) { 248 1.1 kamil DPRINTF("kp_sigmask=" 249 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n", 250 1.1 kamil kp_sigmask.__bits[0], kp_sigmask.__bits[1], 251 1.1 kamil kp_sigmask.__bits[2], kp_sigmask.__bits[3]); 252 1.1 kamil 253 1.1 kamil DPRINTF("kp.p_sigmask=" 254 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n", 255 1.1 kamil kp.p_sigmask.__bits[0], kp.p_sigmask.__bits[1], 256 1.1 kamil kp.p_sigmask.__bits[2], kp.p_sigmask.__bits[3]); 257 1.1 kamil 258 1.1 kamil ATF_REQUIRE(!memcmp(&kp_sigmask, &kp.p_sigmask, 259 1.1 kamil sizeof(kp_sigmask))); 260 1.1 kamil } 261 1.1 kamil 262 1.1 kamil if (ignored) { 263 1.1 kamil DPRINTF("kp_sigignore=" 264 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n", 265 1.1 kamil kp_sigignore.__bits[0], kp_sigignore.__bits[1], 266 1.1 kamil kp_sigignore.__bits[2], kp_sigignore.__bits[3]); 267 1.1 kamil 268 1.1 kamil DPRINTF("kp.p_sigignore=" 269 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n", 270 1.1 kamil kp.p_sigignore.__bits[0], kp.p_sigignore.__bits[1], 271 1.1 kamil kp.p_sigignore.__bits[2], kp.p_sigignore.__bits[3]); 272 1.1 kamil 273 1.1 kamil ATF_REQUIRE(!memcmp(&kp_sigignore, &kp.p_sigignore, 274 1.1 kamil sizeof(kp_sigignore))); 275 1.1 kamil } 276 1.1 kamil 277 1.1 kamil DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n"); 278 1.1 kamil SYSCALL_REQUIRE( 279 1.1 kamil ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1); 280 1.1 kamil 281 1.1 kamil DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid); 282 1.1 kamil DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n", 283 1.1 kamil info.psi_siginfo.si_signo, info.psi_siginfo.si_code, 284 1.1 kamil info.psi_siginfo.si_errno); 285 1.1 kamil 286 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval); 287 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC); 288 1.1 kamil 289 1.1 kamil DPRINTF("Before resuming the child process where it left off and " 290 1.1 kamil "without signal to be sent\n"); 291 1.1 kamil SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1); 292 1.1 kamil 293 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME); 294 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child); 295 1.1 kamil 296 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME); 297 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0)); 298 1.1 kamil } 299 1.1 kamil 300 1.1 kamil #define TRACEME_EXEC(test, masked, ignored) \ 301 1.1 kamil ATF_TC(test); \ 302 1.1 kamil ATF_TC_HEAD(test, tc) \ 303 1.1 kamil { \ 304 1.1 kamil atf_tc_set_md_var(tc, "descr", \ 305 1.1 kamil "Detect SIGTRAP TRAP_EXEC from " \ 306 1.1 kamil "child%s%s", masked ? " with masked signal" : "", \ 307 1.1 kamil masked ? " with ignored signal" : ""); \ 308 1.1 kamil } \ 309 1.1 kamil \ 310 1.1 kamil ATF_TC_BODY(test, tc) \ 311 1.1 kamil { \ 312 1.1 kamil \ 313 1.1 kamil traceme_exec(masked, ignored); \ 314 1.1 kamil } 315 1.1 kamil 316 1.1 kamil TRACEME_EXEC(traceme_exec, false, false) 317 1.1 kamil TRACEME_EXEC(traceme_signalmasked_exec, true, false) 318 1.1 kamil TRACEME_EXEC(traceme_signalignored_exec, false, true) 319 1.1 kamil 320 1.1 kamil #define ATF_TP_ADD_TCS_PTRACE_WAIT_EXEC() \ 321 1.1 kamil ATF_TP_ADD_TC(tp, traceme_vfork_exec); \ 322 1.1 kamil ATF_TP_ADD_TC(tp, traceme_vfork_signalmasked_exec); \ 323 1.1 kamil ATF_TP_ADD_TC(tp, traceme_vfork_signalignored_exec); \ 324 1.1 kamil ATF_TP_ADD_TC(tp, traceme_exec); \ 325 1.1 kamil ATF_TP_ADD_TC(tp, traceme_signalmasked_exec); \ 326 1.1 kamil ATF_TP_ADD_TC(tp, traceme_signalignored_exec); 327