t_ptrace_exec_wait.h revision 1.1 1 1.1 kamil /* $NetBSD: t_ptrace_exec_wait.h,v 1.1 2020/05/05 00:23:12 kamil Exp $ */
2 1.1 kamil
3 1.1 kamil /*-
4 1.1 kamil * Copyright (c) 2016, 2017, 2018, 2019, 2020 The NetBSD Foundation, Inc.
5 1.1 kamil * All rights reserved.
6 1.1 kamil *
7 1.1 kamil * Redistribution and use in source and binary forms, with or without
8 1.1 kamil * modification, are permitted provided that the following conditions
9 1.1 kamil * are met:
10 1.1 kamil * 1. Redistributions of source code must retain the above copyright
11 1.1 kamil * notice, this list of conditions and the following disclaimer.
12 1.1 kamil * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 kamil * notice, this list of conditions and the following disclaimer in the
14 1.1 kamil * documentation and/or other materials provided with the distribution.
15 1.1 kamil *
16 1.1 kamil * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 1.1 kamil * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 1.1 kamil * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 1.1 kamil * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 1.1 kamil * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 1.1 kamil * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 1.1 kamil * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 1.1 kamil * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 1.1 kamil * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 1.1 kamil * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 1.1 kamil * POSSIBILITY OF SUCH DAMAGE.
27 1.1 kamil */
28 1.1 kamil
29 1.1 kamil static void
30 1.1 kamil traceme_vfork_exec(bool masked, bool ignored)
31 1.1 kamil {
32 1.1 kamil const int sigval = SIGTRAP;
33 1.1 kamil pid_t child, wpid;
34 1.1 kamil #if defined(TWAIT_HAVE_STATUS)
35 1.1 kamil int status;
36 1.1 kamil #endif
37 1.1 kamil struct sigaction sa;
38 1.1 kamil struct ptrace_siginfo info;
39 1.1 kamil sigset_t intmask;
40 1.1 kamil struct kinfo_proc2 kp;
41 1.1 kamil size_t len = sizeof(kp);
42 1.1 kamil
43 1.1 kamil int name[6];
44 1.1 kamil const size_t namelen = __arraycount(name);
45 1.1 kamil ki_sigset_t kp_sigmask;
46 1.1 kamil ki_sigset_t kp_sigignore;
47 1.1 kamil
48 1.1 kamil memset(&info, 0, sizeof(info));
49 1.1 kamil
50 1.1 kamil DPRINTF("Before forking process PID=%d\n", getpid());
51 1.1 kamil SYSCALL_REQUIRE((child = vfork()) != -1);
52 1.1 kamil if (child == 0) {
53 1.1 kamil DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
54 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
55 1.1 kamil
56 1.1 kamil if (masked) {
57 1.1 kamil sigemptyset(&intmask);
58 1.1 kamil sigaddset(&intmask, sigval);
59 1.1 kamil sigprocmask(SIG_BLOCK, &intmask, NULL);
60 1.1 kamil }
61 1.1 kamil
62 1.1 kamil if (ignored) {
63 1.1 kamil memset(&sa, 0, sizeof(sa));
64 1.1 kamil sa.sa_handler = SIG_IGN;
65 1.1 kamil sigemptyset(&sa.sa_mask);
66 1.1 kamil FORKEE_ASSERT(sigaction(sigval, &sa, NULL) != -1);
67 1.1 kamil }
68 1.1 kamil
69 1.1 kamil DPRINTF("Before calling execve(2) from child\n");
70 1.1 kamil execlp("/bin/echo", "/bin/echo", NULL);
71 1.1 kamil
72 1.1 kamil /* NOTREACHED */
73 1.1 kamil FORKEE_ASSERTX(0 && "Not reached");
74 1.1 kamil }
75 1.1 kamil DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
76 1.1 kamil
77 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
78 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
79 1.1 kamil
80 1.1 kamil validate_status_stopped(status, sigval);
81 1.1 kamil
82 1.1 kamil name[0] = CTL_KERN,
83 1.1 kamil name[1] = KERN_PROC2,
84 1.1 kamil name[2] = KERN_PROC_PID;
85 1.1 kamil name[3] = getpid();
86 1.1 kamil name[4] = sizeof(kp);
87 1.1 kamil name[5] = 1;
88 1.1 kamil
89 1.1 kamil ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
90 1.1 kamil
91 1.1 kamil if (masked)
92 1.1 kamil kp_sigmask = kp.p_sigmask;
93 1.1 kamil
94 1.1 kamil if (ignored)
95 1.1 kamil kp_sigignore = kp.p_sigignore;
96 1.1 kamil
97 1.1 kamil name[3] = getpid();
98 1.1 kamil
99 1.1 kamil ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
100 1.1 kamil
101 1.1 kamil if (masked) {
102 1.1 kamil DPRINTF("kp_sigmask="
103 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
104 1.1 kamil kp_sigmask.__bits[0], kp_sigmask.__bits[1],
105 1.1 kamil kp_sigmask.__bits[2], kp_sigmask.__bits[3]);
106 1.1 kamil
107 1.1 kamil DPRINTF("kp.p_sigmask="
108 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
109 1.1 kamil kp.p_sigmask.__bits[0], kp.p_sigmask.__bits[1],
110 1.1 kamil kp.p_sigmask.__bits[2], kp.p_sigmask.__bits[3]);
111 1.1 kamil
112 1.1 kamil ATF_REQUIRE(!memcmp(&kp_sigmask, &kp.p_sigmask,
113 1.1 kamil sizeof(kp_sigmask)));
114 1.1 kamil }
115 1.1 kamil
116 1.1 kamil if (ignored) {
117 1.1 kamil DPRINTF("kp_sigignore="
118 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
119 1.1 kamil kp_sigignore.__bits[0], kp_sigignore.__bits[1],
120 1.1 kamil kp_sigignore.__bits[2], kp_sigignore.__bits[3]);
121 1.1 kamil
122 1.1 kamil DPRINTF("kp.p_sigignore="
123 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
124 1.1 kamil kp.p_sigignore.__bits[0], kp.p_sigignore.__bits[1],
125 1.1 kamil kp.p_sigignore.__bits[2], kp.p_sigignore.__bits[3]);
126 1.1 kamil
127 1.1 kamil ATF_REQUIRE(!memcmp(&kp_sigignore, &kp.p_sigignore,
128 1.1 kamil sizeof(kp_sigignore)));
129 1.1 kamil }
130 1.1 kamil
131 1.1 kamil DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
132 1.1 kamil SYSCALL_REQUIRE(
133 1.1 kamil ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
134 1.1 kamil
135 1.1 kamil DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
136 1.1 kamil DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
137 1.1 kamil info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
138 1.1 kamil info.psi_siginfo.si_errno);
139 1.1 kamil
140 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
141 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
142 1.1 kamil
143 1.1 kamil DPRINTF("Before resuming the child process where it left off and "
144 1.1 kamil "without signal to be sent\n");
145 1.1 kamil SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
146 1.1 kamil
147 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
148 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
149 1.1 kamil
150 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
151 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
152 1.1 kamil }
153 1.1 kamil
154 1.1 kamil #define TRACEME_VFORK_EXEC(test, masked, ignored) \
155 1.1 kamil ATF_TC(test); \
156 1.1 kamil ATF_TC_HEAD(test, tc) \
157 1.1 kamil { \
158 1.1 kamil atf_tc_set_md_var(tc, "descr", \
159 1.1 kamil "Verify PT_TRACE_ME followed by exec(3) in a vfork(2)ed " \
160 1.1 kamil "child%s%s", masked ? " with masked signal" : "", \
161 1.1 kamil masked ? " with ignored signal" : ""); \
162 1.1 kamil } \
163 1.1 kamil \
164 1.1 kamil ATF_TC_BODY(test, tc) \
165 1.1 kamil { \
166 1.1 kamil \
167 1.1 kamil traceme_vfork_exec(masked, ignored); \
168 1.1 kamil }
169 1.1 kamil
170 1.1 kamil TRACEME_VFORK_EXEC(traceme_vfork_exec, false, false)
171 1.1 kamil TRACEME_VFORK_EXEC(traceme_vfork_signalmasked_exec, true, false)
172 1.1 kamil TRACEME_VFORK_EXEC(traceme_vfork_signalignored_exec, false, true)
173 1.1 kamil
174 1.1 kamil /// ----------------------------------------------------------------------------
175 1.1 kamil
176 1.1 kamil static void
177 1.1 kamil traceme_exec(bool masked, bool ignored)
178 1.1 kamil {
179 1.1 kamil const int sigval = SIGTRAP;
180 1.1 kamil pid_t child, wpid;
181 1.1 kamil #if defined(TWAIT_HAVE_STATUS)
182 1.1 kamil int status;
183 1.1 kamil #endif
184 1.1 kamil struct sigaction sa;
185 1.1 kamil struct ptrace_siginfo info;
186 1.1 kamil sigset_t intmask;
187 1.1 kamil struct kinfo_proc2 kp;
188 1.1 kamil size_t len = sizeof(kp);
189 1.1 kamil
190 1.1 kamil int name[6];
191 1.1 kamil const size_t namelen = __arraycount(name);
192 1.1 kamil ki_sigset_t kp_sigmask;
193 1.1 kamil ki_sigset_t kp_sigignore;
194 1.1 kamil
195 1.1 kamil memset(&info, 0, sizeof(info));
196 1.1 kamil
197 1.1 kamil DPRINTF("Before forking process PID=%d\n", getpid());
198 1.1 kamil SYSCALL_REQUIRE((child = fork()) != -1);
199 1.1 kamil if (child == 0) {
200 1.1 kamil DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
201 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
202 1.1 kamil
203 1.1 kamil if (masked) {
204 1.1 kamil sigemptyset(&intmask);
205 1.1 kamil sigaddset(&intmask, sigval);
206 1.1 kamil sigprocmask(SIG_BLOCK, &intmask, NULL);
207 1.1 kamil }
208 1.1 kamil
209 1.1 kamil if (ignored) {
210 1.1 kamil memset(&sa, 0, sizeof(sa));
211 1.1 kamil sa.sa_handler = SIG_IGN;
212 1.1 kamil sigemptyset(&sa.sa_mask);
213 1.1 kamil FORKEE_ASSERT(sigaction(sigval, &sa, NULL) != -1);
214 1.1 kamil }
215 1.1 kamil
216 1.1 kamil DPRINTF("Before calling execve(2) from child\n");
217 1.1 kamil execlp("/bin/echo", "/bin/echo", NULL);
218 1.1 kamil
219 1.1 kamil FORKEE_ASSERT(0 && "Not reached");
220 1.1 kamil }
221 1.1 kamil DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
222 1.1 kamil
223 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
224 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
225 1.1 kamil
226 1.1 kamil validate_status_stopped(status, sigval);
227 1.1 kamil
228 1.1 kamil name[0] = CTL_KERN,
229 1.1 kamil name[1] = KERN_PROC2,
230 1.1 kamil name[2] = KERN_PROC_PID;
231 1.1 kamil name[3] = getpid();
232 1.1 kamil name[4] = sizeof(kp);
233 1.1 kamil name[5] = 1;
234 1.1 kamil
235 1.1 kamil ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
236 1.1 kamil
237 1.1 kamil if (masked)
238 1.1 kamil kp_sigmask = kp.p_sigmask;
239 1.1 kamil
240 1.1 kamil if (ignored)
241 1.1 kamil kp_sigignore = kp.p_sigignore;
242 1.1 kamil
243 1.1 kamil name[3] = getpid();
244 1.1 kamil
245 1.1 kamil ATF_REQUIRE_EQ(sysctl(name, namelen, &kp, &len, NULL, 0), 0);
246 1.1 kamil
247 1.1 kamil if (masked) {
248 1.1 kamil DPRINTF("kp_sigmask="
249 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
250 1.1 kamil kp_sigmask.__bits[0], kp_sigmask.__bits[1],
251 1.1 kamil kp_sigmask.__bits[2], kp_sigmask.__bits[3]);
252 1.1 kamil
253 1.1 kamil DPRINTF("kp.p_sigmask="
254 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
255 1.1 kamil kp.p_sigmask.__bits[0], kp.p_sigmask.__bits[1],
256 1.1 kamil kp.p_sigmask.__bits[2], kp.p_sigmask.__bits[3]);
257 1.1 kamil
258 1.1 kamil ATF_REQUIRE(!memcmp(&kp_sigmask, &kp.p_sigmask,
259 1.1 kamil sizeof(kp_sigmask)));
260 1.1 kamil }
261 1.1 kamil
262 1.1 kamil if (ignored) {
263 1.1 kamil DPRINTF("kp_sigignore="
264 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
265 1.1 kamil kp_sigignore.__bits[0], kp_sigignore.__bits[1],
266 1.1 kamil kp_sigignore.__bits[2], kp_sigignore.__bits[3]);
267 1.1 kamil
268 1.1 kamil DPRINTF("kp.p_sigignore="
269 1.1 kamil "%#02" PRIx32 "%02" PRIx32 "%02" PRIx32 "%02" PRIx32"\n",
270 1.1 kamil kp.p_sigignore.__bits[0], kp.p_sigignore.__bits[1],
271 1.1 kamil kp.p_sigignore.__bits[2], kp.p_sigignore.__bits[3]);
272 1.1 kamil
273 1.1 kamil ATF_REQUIRE(!memcmp(&kp_sigignore, &kp.p_sigignore,
274 1.1 kamil sizeof(kp_sigignore)));
275 1.1 kamil }
276 1.1 kamil
277 1.1 kamil DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
278 1.1 kamil SYSCALL_REQUIRE(
279 1.1 kamil ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
280 1.1 kamil
281 1.1 kamil DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
282 1.1 kamil DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
283 1.1 kamil info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
284 1.1 kamil info.psi_siginfo.si_errno);
285 1.1 kamil
286 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
287 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
288 1.1 kamil
289 1.1 kamil DPRINTF("Before resuming the child process where it left off and "
290 1.1 kamil "without signal to be sent\n");
291 1.1 kamil SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
292 1.1 kamil
293 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
294 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
295 1.1 kamil
296 1.1 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
297 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
298 1.1 kamil }
299 1.1 kamil
300 1.1 kamil #define TRACEME_EXEC(test, masked, ignored) \
301 1.1 kamil ATF_TC(test); \
302 1.1 kamil ATF_TC_HEAD(test, tc) \
303 1.1 kamil { \
304 1.1 kamil atf_tc_set_md_var(tc, "descr", \
305 1.1 kamil "Detect SIGTRAP TRAP_EXEC from " \
306 1.1 kamil "child%s%s", masked ? " with masked signal" : "", \
307 1.1 kamil masked ? " with ignored signal" : ""); \
308 1.1 kamil } \
309 1.1 kamil \
310 1.1 kamil ATF_TC_BODY(test, tc) \
311 1.1 kamil { \
312 1.1 kamil \
313 1.1 kamil traceme_exec(masked, ignored); \
314 1.1 kamil }
315 1.1 kamil
316 1.1 kamil TRACEME_EXEC(traceme_exec, false, false)
317 1.1 kamil TRACEME_EXEC(traceme_signalmasked_exec, true, false)
318 1.1 kamil TRACEME_EXEC(traceme_signalignored_exec, false, true)
319 1.1 kamil
320 1.1 kamil #define ATF_TP_ADD_TCS_PTRACE_WAIT_EXEC() \
321 1.1 kamil ATF_TP_ADD_TC(tp, traceme_vfork_exec); \
322 1.1 kamil ATF_TP_ADD_TC(tp, traceme_vfork_signalmasked_exec); \
323 1.1 kamil ATF_TP_ADD_TC(tp, traceme_vfork_signalignored_exec); \
324 1.1 kamil ATF_TP_ADD_TC(tp, traceme_exec); \
325 1.1 kamil ATF_TP_ADD_TC(tp, traceme_signalmasked_exec); \
326 1.1 kamil ATF_TP_ADD_TC(tp, traceme_signalignored_exec);
327