Home | History | Annotate | Line # | Download | only in sys
      1  1.1  kamil /*	$NetBSD: t_ptrace_exec_wait.h,v 1.1 2020/05/05 00:23:12 kamil Exp $	*/
      2  1.1  kamil 
      3  1.1  kamil /*-
      4  1.1  kamil  * Copyright (c) 2016, 2017, 2018, 2019, 2020 The NetBSD Foundation, Inc.
      5  1.1  kamil  * All rights reserved.
      6  1.1  kamil  *
      7  1.1  kamil  * Redistribution and use in source and binary forms, with or without
      8  1.1  kamil  * modification, are permitted provided that the following conditions
      9  1.1  kamil  * are met:
     10  1.1  kamil  * 1. Redistributions of source code must retain the above copyright
     11  1.1  kamil  *    notice, this list of conditions and the following disclaimer.
     12  1.1  kamil  * 2. Redistributions in binary form must reproduce the above copyright
     13  1.1  kamil  *    notice, this list of conditions and the following disclaimer in the
     14  1.1  kamil  *    documentation and/or other materials provided with the distribution.
     15  1.1  kamil  *
     16  1.1  kamil  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17  1.1  kamil  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18  1.1  kamil  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19  1.1  kamil  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20  1.1  kamil  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21  1.1  kamil  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22  1.1  kamil  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23  1.1  kamil  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24  1.1  kamil  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25  1.1  kamil  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26  1.1  kamil  * POSSIBILITY OF SUCH DAMAGE.
     27  1.1  kamil  */
     28  1.1  kamil 
     29  1.1  kamil static void
     30  1.1  kamil traceme_vfork_exec(bool masked, bool ignored)
     31  1.1  kamil {
     32  1.1  kamil 	const int sigval = SIGTRAP;
     33  1.1  kamil 	pid_t child, wpid;
     34  1.1  kamil #if defined(TWAIT_HAVE_STATUS)
     35  1.1  kamil 	int status;
     36  1.1  kamil #endif
     37  1.1  kamil 	struct sigaction sa;
     38  1.1  kamil 	struct ptrace_siginfo info;
     39  1.1  kamil 	sigset_t intmask;
     40  1.1  kamil 	struct kinfo_proc2 kp;
     41  1.1  kamil 	size_t len = sizeof(kp);
     42  1.1  kamil 
     43  1.1  kamil 	int name[6];
     44  1.1  kamil 	const size_t namelen = __arraycount(name);
     45  1.1  kamil 	ki_sigset_t kp_sigmask;
     46  1.1  kamil 	ki_sigset_t kp_sigignore;
     47  1.1  kamil 
     48  1.1  kamil 	memset(&info, 0, sizeof(info));
     49  1.1  kamil 
     50  1.1  kamil 	DPRINTF("Before forking process PID=%d\n", getpid());
     51  1.1  kamil 	SYSCALL_REQUIRE((child = vfork()) != -1);
     52  1.1  kamil 	if (child == 0) {
     53  1.1  kamil 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
     54  1.1  kamil 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
     55  1.1  kamil 
     56  1.1  kamil 		if (masked) {
     57  1.1  kamil 			sigemptyset(&intmask);
     58  1.1  kamil 			sigaddset(&intmask, sigval);
     59  1.1  kamil 			sigprocmask(SIG_BLOCK, &intmask, NULL);
     60  1.1  kamil 		}
     61  1.1  kamil 
     62  1.1  kamil 		if (ignored) {
     63  1.1  kamil 			memset(&sa, 0, sizeof(sa));
     64  1.1  kamil 			sa.sa_handler = SIG_IGN;
     65  1.1  kamil 			sigemptyset(&sa.sa_mask);
     66  1.1  kamil 			FORKEE_ASSERT(sigaction(sigval, &sa, NULL) != -1);
     67  1.1  kamil 		}
     68  1.1  kamil 
     69  1.1  kamil 		DPRINTF("Before calling execve(2) from child\n");
     70  1.1  kamil 		execlp("/bin/echo", "/bin/echo", NULL);
     71  1.1  kamil 
     72  1.1  kamil 		/* NOTREACHED */
     73  1.1  kamil 		FORKEE_ASSERTX(0 && "Not reached");
     74  1.1  kamil 	}
     75  1.1  kamil 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
     76  1.1  kamil 
     77  1.1  kamil 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
     78  1.1  kamil 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
     79  1.1  kamil 
     80  1.1  kamil 	validate_status_stopped(status, sigval);
     81  1.1  kamil 
     82  1.1  kamil 	name[0] = CTL_KERN,
     83  1.1  kamil 	name[1] = KERN_PROC2,
     84  1.1  kamil 	name[2] = KERN_PROC_PID;
     85  1.1  kamil 	name[3] = getpid();
     86  1.1  kamil 	name[4] = sizeof(kp);
     87  1.1  kamil 	name[5] = 1;
     88  1.1  kamil 
     89  1.1  kamil 	ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
     90  1.1  kamil 
     91  1.1  kamil 	if (masked)
     92  1.1  kamil 		kp_sigmask = kp.p_sigmask;
     93  1.1  kamil 
     94  1.1  kamil 	if (ignored)
     95  1.1  kamil 		kp_sigignore = kp.p_sigignore;
     96  1.1  kamil 
     97  1.1  kamil 	name[3] = getpid();
     98  1.1  kamil 
     99  1.1  kamil 	ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
    100  1.1  kamil 
    101  1.1  kamil 	if (masked) {
    102  1.1  kamil 		DPRINTF("kp_sigmask="
    103  1.1  kamil 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
    104  1.1  kamil 		    kp_sigmask.__bits[0], kp_sigmask.__bits[1],
    105  1.1  kamil 		    kp_sigmask.__bits[2], kp_sigmask.__bits[3]);
    106  1.1  kamil 
    107  1.1  kamil 	        DPRINTF("kp.p_sigmask="
    108  1.1  kamil 	            "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
    109  1.1  kamil 	            kp.p_sigmask.__bits[0], kp.p_sigmask.__bits[1],
    110  1.1  kamil 	            kp.p_sigmask.__bits[2], kp.p_sigmask.__bits[3]);
    111  1.1  kamil 
    112  1.1  kamil 		ATF_REQUIRE(!memcmp(&kp_sigmask, &kp.p_sigmask,
    113  1.1  kamil 		    sizeof(kp_sigmask)));
    114  1.1  kamil 	}
    115  1.1  kamil 
    116  1.1  kamil 	if (ignored) {
    117  1.1  kamil 		DPRINTF("kp_sigignore="
    118  1.1  kamil 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
    119  1.1  kamil 		    kp_sigignore.__bits[0], kp_sigignore.__bits[1],
    120  1.1  kamil 		    kp_sigignore.__bits[2], kp_sigignore.__bits[3]);
    121  1.1  kamil 
    122  1.1  kamil 	        DPRINTF("kp.p_sigignore="
    123  1.1  kamil 	            "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
    124  1.1  kamil 	            kp.p_sigignore.__bits[0], kp.p_sigignore.__bits[1],
    125  1.1  kamil 	            kp.p_sigignore.__bits[2], kp.p_sigignore.__bits[3]);
    126  1.1  kamil 
    127  1.1  kamil 		ATF_REQUIRE(!memcmp(&kp_sigignore, &kp.p_sigignore,
    128  1.1  kamil 		    sizeof(kp_sigignore)));
    129  1.1  kamil 	}
    130  1.1  kamil 
    131  1.1  kamil 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
    132  1.1  kamil 	SYSCALL_REQUIRE(
    133  1.1  kamil 	    ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
    134  1.1  kamil 
    135  1.1  kamil 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
    136  1.1  kamil 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
    137  1.1  kamil 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
    138  1.1  kamil 	    info.psi_siginfo.si_errno);
    139  1.1  kamil 
    140  1.1  kamil 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
    141  1.1  kamil 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
    142  1.1  kamil 
    143  1.1  kamil 	DPRINTF("Before resuming the child process where it left off and "
    144  1.1  kamil 	    "without signal to be sent\n");
    145  1.1  kamil 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
    146  1.1  kamil 
    147  1.1  kamil 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
    148  1.1  kamil 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
    149  1.1  kamil 
    150  1.1  kamil 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
    151  1.1  kamil 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
    152  1.1  kamil }
    153  1.1  kamil 
    154  1.1  kamil #define TRACEME_VFORK_EXEC(test, masked, ignored)			\
    155  1.1  kamil ATF_TC(test);								\
    156  1.1  kamil ATF_TC_HEAD(test, tc)							\
    157  1.1  kamil {									\
    158  1.1  kamil 	atf_tc_set_md_var(tc, "descr",					\
    159  1.1  kamil 	    "Verify PT_TRACE_ME followed by exec(3) in a vfork(2)ed "	\
    160  1.1  kamil 	    "child%s%s", masked ? " with masked signal" : "",		\
    161  1.1  kamil 	    masked ? " with ignored signal" : "");			\
    162  1.1  kamil }									\
    163  1.1  kamil 									\
    164  1.1  kamil ATF_TC_BODY(test, tc)							\
    165  1.1  kamil {									\
    166  1.1  kamil 									\
    167  1.1  kamil 	traceme_vfork_exec(masked, ignored);				\
    168  1.1  kamil }
    169  1.1  kamil 
    170  1.1  kamil TRACEME_VFORK_EXEC(traceme_vfork_exec, false, false)
    171  1.1  kamil TRACEME_VFORK_EXEC(traceme_vfork_signalmasked_exec, true, false)
    172  1.1  kamil TRACEME_VFORK_EXEC(traceme_vfork_signalignored_exec, false, true)
    173  1.1  kamil 
    174  1.1  kamil /// ----------------------------------------------------------------------------
    175  1.1  kamil 
    176  1.1  kamil static void
    177  1.1  kamil traceme_exec(bool masked, bool ignored)
    178  1.1  kamil {
    179  1.1  kamil 	const int sigval = SIGTRAP;
    180  1.1  kamil 	pid_t child, wpid;
    181  1.1  kamil #if defined(TWAIT_HAVE_STATUS)
    182  1.1  kamil 	int status;
    183  1.1  kamil #endif
    184  1.1  kamil 	struct sigaction sa;
    185  1.1  kamil 	struct ptrace_siginfo info;
    186  1.1  kamil 	sigset_t intmask;
    187  1.1  kamil 	struct kinfo_proc2 kp;
    188  1.1  kamil 	size_t len = sizeof(kp);
    189  1.1  kamil 
    190  1.1  kamil 	int name[6];
    191  1.1  kamil 	const size_t namelen = __arraycount(name);
    192  1.1  kamil 	ki_sigset_t kp_sigmask;
    193  1.1  kamil 	ki_sigset_t kp_sigignore;
    194  1.1  kamil 
    195  1.1  kamil 	memset(&info, 0, sizeof(info));
    196  1.1  kamil 
    197  1.1  kamil 	DPRINTF("Before forking process PID=%d\n", getpid());
    198  1.1  kamil 	SYSCALL_REQUIRE((child = fork()) != -1);
    199  1.1  kamil 	if (child == 0) {
    200  1.1  kamil 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
    201  1.1  kamil 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
    202  1.1  kamil 
    203  1.1  kamil 		if (masked) {
    204  1.1  kamil 			sigemptyset(&intmask);
    205  1.1  kamil 			sigaddset(&intmask, sigval);
    206  1.1  kamil 			sigprocmask(SIG_BLOCK, &intmask, NULL);
    207  1.1  kamil 		}
    208  1.1  kamil 
    209  1.1  kamil 		if (ignored) {
    210  1.1  kamil 			memset(&sa, 0, sizeof(sa));
    211  1.1  kamil 			sa.sa_handler = SIG_IGN;
    212  1.1  kamil 			sigemptyset(&sa.sa_mask);
    213  1.1  kamil 			FORKEE_ASSERT(sigaction(sigval, &sa, NULL) != -1);
    214  1.1  kamil 		}
    215  1.1  kamil 
    216  1.1  kamil 		DPRINTF("Before calling execve(2) from child\n");
    217  1.1  kamil 		execlp("/bin/echo", "/bin/echo", NULL);
    218  1.1  kamil 
    219  1.1  kamil 		FORKEE_ASSERT(0 && "Not reached");
    220  1.1  kamil 	}
    221  1.1  kamil 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
    222  1.1  kamil 
    223  1.1  kamil 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
    224  1.1  kamil 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
    225  1.1  kamil 
    226  1.1  kamil 	validate_status_stopped(status, sigval);
    227  1.1  kamil 
    228  1.1  kamil 	name[0] = CTL_KERN,
    229  1.1  kamil 	name[1] = KERN_PROC2,
    230  1.1  kamil 	name[2] = KERN_PROC_PID;
    231  1.1  kamil 	name[3] = getpid();
    232  1.1  kamil 	name[4] = sizeof(kp);
    233  1.1  kamil 	name[5] = 1;
    234  1.1  kamil 
    235  1.1  kamil 	ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
    236  1.1  kamil 
    237  1.1  kamil 	if (masked)
    238  1.1  kamil 		kp_sigmask = kp.p_sigmask;
    239  1.1  kamil 
    240  1.1  kamil 	if (ignored)
    241  1.1  kamil 		kp_sigignore = kp.p_sigignore;
    242  1.1  kamil 
    243  1.1  kamil 	name[3] = getpid();
    244  1.1  kamil 
    245  1.1  kamil 	ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
    246  1.1  kamil 
    247  1.1  kamil 	if (masked) {
    248  1.1  kamil 		DPRINTF("kp_sigmask="
    249  1.1  kamil 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
    250  1.1  kamil 		    kp_sigmask.__bits[0], kp_sigmask.__bits[1],
    251  1.1  kamil 		    kp_sigmask.__bits[2], kp_sigmask.__bits[3]);
    252  1.1  kamil 
    253  1.1  kamil 		DPRINTF("kp.p_sigmask="
    254  1.1  kamil 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
    255  1.1  kamil 		    kp.p_sigmask.__bits[0], kp.p_sigmask.__bits[1],
    256  1.1  kamil 		    kp.p_sigmask.__bits[2], kp.p_sigmask.__bits[3]);
    257  1.1  kamil 
    258  1.1  kamil 		ATF_REQUIRE(!memcmp(&kp_sigmask, &kp.p_sigmask,
    259  1.1  kamil 		    sizeof(kp_sigmask)));
    260  1.1  kamil 	}
    261  1.1  kamil 
    262  1.1  kamil 	if (ignored) {
    263  1.1  kamil 		DPRINTF("kp_sigignore="
    264  1.1  kamil 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
    265  1.1  kamil 		    kp_sigignore.__bits[0], kp_sigignore.__bits[1],
    266  1.1  kamil 		    kp_sigignore.__bits[2], kp_sigignore.__bits[3]);
    267  1.1  kamil 
    268  1.1  kamil 		DPRINTF("kp.p_sigignore="
    269  1.1  kamil 		    "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
    270  1.1  kamil 		    kp.p_sigignore.__bits[0], kp.p_sigignore.__bits[1],
    271  1.1  kamil 		    kp.p_sigignore.__bits[2], kp.p_sigignore.__bits[3]);
    272  1.1  kamil 
    273  1.1  kamil 		ATF_REQUIRE(!memcmp(&kp_sigignore, &kp.p_sigignore,
    274  1.1  kamil 		    sizeof(kp_sigignore)));
    275  1.1  kamil 	}
    276  1.1  kamil 
    277  1.1  kamil 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
    278  1.1  kamil 	SYSCALL_REQUIRE(
    279  1.1  kamil 	    ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
    280  1.1  kamil 
    281  1.1  kamil 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
    282  1.1  kamil 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
    283  1.1  kamil 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
    284  1.1  kamil 	    info.psi_siginfo.si_errno);
    285  1.1  kamil 
    286  1.1  kamil 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
    287  1.1  kamil 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
    288  1.1  kamil 
    289  1.1  kamil 	DPRINTF("Before resuming the child process where it left off and "
    290  1.1  kamil 	    "without signal to be sent\n");
    291  1.1  kamil 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
    292  1.1  kamil 
    293  1.1  kamil 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
    294  1.1  kamil 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
    295  1.1  kamil 
    296  1.1  kamil 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
    297  1.1  kamil 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
    298  1.1  kamil }
    299  1.1  kamil 
    300  1.1  kamil #define TRACEME_EXEC(test, masked, ignored)				\
    301  1.1  kamil ATF_TC(test);								\
    302  1.1  kamil ATF_TC_HEAD(test, tc)							\
    303  1.1  kamil {									\
    304  1.1  kamil        atf_tc_set_md_var(tc, "descr",					\
    305  1.1  kamil            "Detect SIGTRAP TRAP_EXEC from "				\
    306  1.1  kamil            "child%s%s", masked ? " with masked signal" : "",		\
    307  1.1  kamil            masked ? " with ignored signal" : "");			\
    308  1.1  kamil }									\
    309  1.1  kamil 									\
    310  1.1  kamil ATF_TC_BODY(test, tc)							\
    311  1.1  kamil {									\
    312  1.1  kamil 									\
    313  1.1  kamil        traceme_exec(masked, ignored);					\
    314  1.1  kamil }
    315  1.1  kamil 
    316  1.1  kamil TRACEME_EXEC(traceme_exec, false, false)
    317  1.1  kamil TRACEME_EXEC(traceme_signalmasked_exec, true, false)
    318  1.1  kamil TRACEME_EXEC(traceme_signalignored_exec, false, true)
    319  1.1  kamil 
    320  1.1  kamil #define ATF_TP_ADD_TCS_PTRACE_WAIT_EXEC() \
    321  1.1  kamil 	ATF_TP_ADD_TC(tp, traceme_vfork_exec); \
    322  1.1  kamil 	ATF_TP_ADD_TC(tp, traceme_vfork_signalmasked_exec); \
    323  1.1  kamil 	ATF_TP_ADD_TC(tp, traceme_vfork_signalignored_exec); \
    324  1.1  kamil 	ATF_TP_ADD_TC(tp, traceme_exec); \
    325  1.1  kamil 	ATF_TP_ADD_TC(tp, traceme_signalmasked_exec); \
    326  1.1  kamil 	ATF_TP_ADD_TC(tp, traceme_signalignored_exec);
    327